Server Component Details | Group: io.mosip.hotlist ---- Artifact: hotlist-service ---- version: 1.2.1.1-SNAPSHOT ---- Commit ID: 50926c8 Group: io.mosip.admin ---- Artifact: admin-service ---- version: 1.2.1.1-SNAPSHOT ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-auditmanager-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-auth-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.biosdk ---- Artifact: biosdk-services ---- version: 1.2.0.1 ---- Commit ID: 2a87b3b Group: io.mosip.idrepository ---- Artifact: credential-service ---- version: 1.2.2.0 ---- Commit ID: 50926c8 Group: io.mosip.idrepository ---- Artifact: credential-request-generator ---- version: 1.2.2.0 ---- Commit ID: 50926c8 Group: io.mosip.datashare ---- Artifact: data-share-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.authentication ---- Artifact: authentication-service ---- version: 1.2.1.0 ---- Commit ID: 86640e4 Group: io.mosip.authentication ---- Artifact: authentication-internal-service ---- version: 1.2.1.0 ---- Commit ID: 86640e4 Group: io.mosip.authentication ---- Artifact: authentication-otp-service ---- version: 1.2.1.0 ---- Commit ID: 50926c8 Group: io.mosip.idrepository ---- Artifact: id-repository-identity-service ---- version: 1.2.2.0 ---- Commit ID: 821bac2 Group: io.mosip.kernel ---- Artifact: kernel-keymanager-service ---- version: 1.2.1-SNAPSHOT ---- Commit ID: d748ead Group: io.mosip.kernel ---- Artifact: kernel-masterdata-service ---- version: 1.2.1.1-SNAPSHOT ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-notification-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-otpmanager-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.pms ---- Artifact: partner-management-service ---- version: 1.2.2.0 ---- Commit ID: cdf2c5c Group: io.mosip.pms ---- Artifact: policy-management-service ---- version: 1.2.2.0 ---- Commit ID: cdf2c5c Group: io.mosip.preregistration.captcha ---- Artifact: pre-registration-captcha-service ---- version: 1.2.0.1 ---- Commit ID: 4e9e71f Group: io.mosip.registrationprocessor ---- Artifact: registration-processor-registration-status-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.resident ---- Artifact: resident-service ---- version: 1.2.1.1-SNAPSHOT ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-syncdata-service ---- version: 1.2.1.1-SNAPSHOT ---- Commit ID: 50926c8 Group: io.mosip.idrepository ---- Artifact: id-repository-vid-service ---- version: 1.2.2.0 ---- Commit ID: 50926c8 Group: io.mosip.esignet ---- Artifact: esignet-service ---- version: 1.4.1 ---- Commit ID: ab88802 | End Points used |
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyId={policyId}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sbiVersion={sbiVersion}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/{sbiId}/devices
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?isActive=false
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageSize=-12
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/pms-111999/generate/apikey
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageNo=111111
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?emailAddress=2t63t@@@
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?pageSize={pageSize}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/trust-chain-certificates
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?make={make}&model={model}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?pageSize={pageSize}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/{sbiId}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/users/user-consent
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/deviceSubType/filtervalues
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyName={policyName}
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?pageSize={pageSize}
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/new
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?orgName={orgName}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?status={status}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=partnerId&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?certificateUploadStatus=not_uploaded
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?make={make}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortType={sortType}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/deviceType/filtervalues
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?deviceType={deviceType}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=orgName&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2
Domain: uat2.mosip.net ---- Module: auditmanager ---- End Point: v1/auditmanager/actuator/info
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/upload
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/partner-certificates-details
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}/group/{policygroupId}/publish
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?sortType={sortType}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/1hhggg9/policy/map
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sbiExpiryStatus={sbiExpiryStatus}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortType=&pageNo=0&pageSize=8
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?sortType={sortType}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?partnerId={partnerId}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?orgName=123@1sse
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyId={policyId}&policyName={policyName}
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyDescription={policyDescription}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyGroupName={policyGroupName}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/oauth/client
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/certificate-data
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?pageNo={pageNo}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?pageSize={pageSize}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?partnerType={partnerType}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageNo=22
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?model={model}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?policyGroupName={policyGroupName}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?partnerId={partnerId}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?orgName={orgName}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortType={sortType}&sortFieldName={sortFieldName}&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/oauth/client/{client_id}
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?status={status}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?deviceSubType={deviceSubType}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?requestDetails={requestDetails}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners/{partnerId}
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/policy-groups
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortType=3@@#&pageNo=0&pageSize=8
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerId=bcbcb
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/{ftmId}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?status={status}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?policyGroupName=@374b
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/trust-chain-certificates?pageNo=0&pageSize=8&issuedTo=PMS_API_CA&issuedBy=PMS_API_CA
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?orgName={orgName}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/ca/upload
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=a2a33
Domain: uat2.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/clientidsecretkey
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?sortType={sortType}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?model={model}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/auth-partners-policies
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?policyGroupName={policyGroupName}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerType=dfdgd
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?make={make}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/system-config
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?policyGroupName=
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?status={status}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3?status=approved&partnerType=FTM_Provider
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?policyName={policyName}
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/{policyGroupId}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerId=-dndn333
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?orgName={orgName}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?status={status}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sortType={sortType}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/email/verify
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?sortType={sortType}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/policy/{mappingkey}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?deviceId={deviceId}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/pms-111999/policy/map
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?partnerId={partnerId}&requestDetails={requestDetails}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?status={status}
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?sortFieldName={sortFieldName}&sortType={sortType}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?partnerId={partnerId}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner
Domain: api-internal.qa-plan.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?pageNo={pageNo}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?pageNo={pageNo}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/{deviceId}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/uploadcertificate
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sbiId={sbiId}
Domain: uat2.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/internal/useridPwd
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?make={make}&model={model}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?pageSize={pageSize}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?emailAddress=454646
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerType=2233ddd
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?partnerId={partnerId}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/{deviceDetailId}/approval
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/certificate
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?apiKeyLabel={apiKeyLabel}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?policyId={policyId}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?policyName={policyName}
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider
Domain: api-internal.qa-plan.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?pageNo={pageNo} | |||||
|---|---|---|---|---|---|---|---|---|
Server Errors No server errors | ||||||||
| Partner Management Service API Test ---- Report Date: 2025-05-14 ---- Tested Environment: qa-plan ---- Commit Id is: 9d92a465 & Branch Name is:release-1.2.2.x | ||||||||
| Test Scenario | # Total | # Passed | # Skipped | # Failed | # Ignored | # Known_Issues | Execution Time (HH:MM:SS) | |
| CreatePolicyGroup | 14 | 12 | 0 | 0 | 0 | 2 | 00:00:04 | |
| DeactivatePolicyGroupBeforePolicyCreation | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DefinePolicy | 27 | 27 | 0 | 0 | 0 | 0 | 00:00:09 | |
| PublishPolicy | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllActivePolicyGroups | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerWithoutPartnerRegister | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllApprovedPartnerIdBeforePartnerCreate | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| CreatePartner | 8 | 6 | 0 | 0 | 0 | 2 | 00:00:03 | |
| GetAllApiKeyForAuthPartnerWithoutPartnerCertifcates | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| VerifyPartnersEmail | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:00 | |
| UploadCACertificate | 9 | 8 | 0 | 1 | 0 | 0 | 00:00:04 | |
| GetAllCertificateBeforeCACertificateUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetOriginalPartnerCertificatesBeforeCertificateUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| UploadPartnerCertificate | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:05 | |
| GetPartnerCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedPartnerId | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllApprovedPartnerIdWithoutAuthentication | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllApiKeyForAuthPartnerBeforePolicyMapping | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllRequestedPolicyBeforeMapping | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| partnerPolicyMapping | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingKey | 6 | 4 | 0 | 0 | 0 | 2 | 00:00:00 | |
| GetAllRequestedPolicy | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllRequestedPolicyAuthvalidations | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllApprovedAuthPartnerPolicy | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllApprovedAuthPartnerPolicyAuthValidations | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllApiKeyForAuthPartnerBeforeApikeyGenerated | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GenerateApiKey | 6 | 4 | 0 | 0 | 0 | 2 | 00:00:01 | |
| ActivateDeactivatePartnerApiKey | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllApiKeyForAuthPartner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllApiKeyForAuthPartnerAfterDeactive | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllPartnerPolicyRequest | 16 | 16 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllPartnerPolicyRequestNegativeScenarios | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetListOfPartners | 22 | 22 | 0 | 0 | 0 | 0 | 00:00:02 | |
| GetDetailsOfPartner | 7 | 6 | 0 | 1 | 0 | 0 | 00:00:01 | |
| GetListOfPolicies | 21 | 21 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfPoliciesRequest | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:02 | |
| GetAllOidcClientBeforeOIDCCreation | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| OAuthClient | 11 | 7 | 0 | 4 | 0 | 0 | 00:00:02 | |
| GetAllOauthClient | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| UpdateOAuthClient | 1 | 0 | 1 | 0 | 0 | 0 | 00:00:00 | |
| GetAllOidcClient | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllOidcClientWithoutAuthentication | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeactivateOIDCClient | 11 | 1 | 7 | 0 | 0 | 3 | 00:00:00 | |
| GetAllOidcClientAfterDeactivateOfOIDC | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetConfiguration | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetUserConsentBeforeConsentGiven | 1 | 0 | 0 | 0 | 0 | 1 | 00:00:00 | |
| saveUserConsent | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetUserConsent | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetOriginalPartnerCertificates | 6 | 4 | 0 | 2 | 0 | 0 | 00:00:00 | |
| GetAllApprovedDeviceProviderIds | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllApprovedDeviceProviderIdsNegativeScenarios | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:00 | |
| SaveSecureBiometricInterfaceCreateDto | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeactivateSBIWithAssociatedDeviceswhichisPendingforApproval | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| UpdateSecureBiometricInterface | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetSbiDetailsList | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeviceTypeFilter | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeviceSubTypeFilter | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| SaveDeviceDetails | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetListOfAllSBI | 14 | 14 | 0 | 0 | 0 | 0 | 00:00:02 | |
| ApproveMappingDeviceToSbi | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| ApproveMappingDeviceToSbiNegativeScenarios | 13 | 13 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingDeviceToSbi | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| RejectMappingDeviceToSbiwhichisRejected | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| RejectMappingDeviceToSbiNegativeScenarios | 32 | 32 | 0 | 0 | 0 | 0 | 00:00:02 | |
| ApproveMappingDeviceToSbiwhichisRejected | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllDeviceListMappedWithSbi | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllDeviceListMappedWithSbiNegativeScenarios | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeactivateDevice | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeactivateDeviceNegativeScenarios | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeactivateSBIWithAssociatedDevices | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeactivateSBIWithAssociatedDevicesNegativeScenarios | 20 | 20 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbiwhenSBIisDeactivated | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllApprovedFtmProvider | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllApprovedFtmProviderNegativeScenarios | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetListAllFTMChipNegativeScenarios | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:00 | |
| CreateFtmChipDetails | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetOriginalFtmCertifacteNegativeScenariosBeforeUploadCert | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeactivateFtmwhichisPendingforCertUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetOriginalFtmCertifacteforPendingforCertUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| UploadCertificateOfFtpChip | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeactivateFtmwhichisPendingforApproval | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| ApproveFTMChipDetail | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetListAllFTMChip | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetOriginalFtmCertifacte | 1 | 0 | 0 | 1 | 0 | 0 | 00:00:00 | |
| GetOriginalFtmCertifacteNegativeScenarios | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeactivateFtm | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeactivateFtmNegativeScenarios | 18 | 18 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteAfterDeactiveFtm | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetListOfFtmChip | 15 | 15 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfFtmChipNegativeScenarios | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetListOfAllSBINegativeScenarios | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetListOfAllDevice | 25 | 25 | 0 | 0 | 0 | 0 | 00:00:02 | |
| GetCountOfFtm | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllSystemConfigs | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:00 | |
| GetAllRootCertificate | 1 | 0 | 0 | 1 | 0 | 0 | 00:00:00 | |
| GetListOfApiKey | 17 | 17 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DownloadRootCertificate | 1 | 0 | 0 | 1 | 0 | 0 | 00:00:00 | |
| DeactivatePolicy | 10 | 10 | 0 | 0 | 0 | 0 | 00:00:00 | |
| DeactivatePolicyGroup | 17 | 17 | 0 | 0 | 0 | 0 | 00:00:01 | |
| Total | 509 | 478 | 8 | 11 | 0 | 12 | 00:01:20 | |
| TestCase Number | TestCase | TestCase Description | Execution Time (HH:MM:SS) |
|---|---|---|---|
| CreatePolicyGroup — known_issues | |||
| TC_PMS_definePolicyGroup_03 | Pms_DefinePolicyGroup_Invalid_Request_Time_Neg | Creating a PolicyGroup with invalid request time | 00:00:00 |
| TC_PMS_definePolicyGroup_06 | Pms_DefinePolicyGroup_Missing_InputParameter_requesttime_neg | Creating a policy group with missing request time | 00:00:00 |
| CreatePolicyGroup — Passed | |||
| TC_PMS_definePolicyGroup_11 | Pms_DefinePolicyGroup_All_Valid_DeleteBeforePolicyCreation_pms_sid | Creating a PolicyGroup for draft policy | 00:00:00 |
| TC_PMS_definePolicyGroup_09 | Pms_DefinePolicyGroup_All_Valid_ForDeactivatePolicy_pms_sid | Creating a PolicyGroup for deactivate policy | 00:00:00 |
| TC_PMS_definePolicyGroup_11 | Pms_DefinePolicyGroup_All_Valid_ForDraftPolicy_pms_sid | Creating a PolicyGroup for draft policy | 00:00:00 |
| TC_PMS_definePolicyGroup_10 | Pms_DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid | Creating a PolicyGroup for published policy | 00:00:00 |
| TC_PMS_definePolicyGroup_01 | Pms_DefinePolicyGroup_All_Valid_Smoke_pms_sid | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_02 | Pms_DefinePolicyGroup_AlreadyExists_InValid_neg | Creating a PolicyGroup | 00:00:00 |
| TC_PMS_definePolicyGroup_08 | Pms_DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid | Creating a PolicyGroup | 00:00:00 |
| TC_PMS_definePolicyGroup_04 | Pms_DefinePolicyGroup_Missing_InputParameter_desc_neg | Creating a Policy Group | 00:00:00 |
| TC_PMS_definePolicyGroup_05 | Pms_DefinePolicyGroup_Missing_InputParameter_name_neg | Creating a Policy Group | 00:00:00 |
| TC_PMS_definePolicyGroup_07 | Pms_DefinePolicyGroup_Without_Auth_neg | Creating a policy group | 00:00:00 |
| Pms_DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid | Creating a PolicyGroup | 00:00:00 | |
| Pms_DefinePolicyGroup_create_then_deactivateAll_Valid_Smoke_pms_sid | Creating a PolicyGroup | 00:00:00 | |
| DeactivatePolicyGroupBeforePolicyCreation — Passed | |||
| TC_PMS_DeactivatePolicyGroupBeforePolicyCreation_01 | Pms_DeactivatePolicyGroupBeforePolicyCreation_All_Valid_Smoke | Deactivate Policy Group before policy is created | 00:00:00 |
| DefinePolicy — Passed | |||
| TC_PMS_definePolicy_29 | Pms_DefinePolicy_All_Valid_For_Draft_Policy_pms_sid | Creating a Policy using PolicyGroup | 00:00:00 |
| TC_PMS_definePolicy_02 | Pms_DefinePolicy_All_Valid_For_Get_ApiKey_with_deactivated_sid | Get API key for deactivated SID | 00:00:00 |
| TC_PMS_definePolicy_28 | Pms_DefinePolicy_All_Valid_For_Published_Policy_pms_sid | Creating a Policy using PolicyGroup | 00:00:00 |
| TC_PMS_definePolicy_06 | Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Blank | Define Policy for invalid AuthTypeToken | 00:00:00 |
| TC_PMS_definePolicy_05 | Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Invalid_Neg | Define Policy For invalid AuthTypeToken | 00:00:00 |
| TC_PMS_definePolicy_03 | Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Null_Neg | Define Policy for auth token type null | 00:00:00 |
| TC_PMS_definePolicy_04 | Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Policy | Define policy for authtoken type policy | 00:00:00 |
| TC_PMS_definePolicy_08 | Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Space | Define Policy for AuthTypeToken space | 00:00:00 |
| TC_PMS_definePolicy_27 | Pms_DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid | Creating a Policy using PolicyGroup | 00:00:00 |
| TC_PMS_definePolicy_01 | Pms_DefinePolicy_All_Valid_Smoke_pms_sid | Creating a Policy using PolicyGroup | 00:00:00 |
| TC_PMS_definePolicy_10 | Pms_DefinePolicy_DemoAuth_With_Same_Policy_Neg | Define Policy with same policyname | 00:00:00 |
| TC_PMS_definePolicy_19 | Pms_DefinePolicy_Missing_InputParameter_authTokenType_Neg | Define Policy without authtoken type | 00:00:00 |
| TC_PMS_definePolicy_18 | Pms_DefinePolicy_Missing_InputParameter_authType_neg | Define policy without authtype | 00:00:00 |
| TC_PMS_definePolicy_16 | Pms_DefinePolicy_Missing_InputParameter_descNeg | Define policy withput input parameter | 00:00:00 |
| TC_PMS_definePolicy_17 | Pms_DefinePolicy_Missing_InputParameter_mandatory_Neg | Define policy | 00:00:00 |
| TC_PMS_definePolicy_15 | Pms_DefinePolicy_Missing_InputParameter_name_Neg | Define policy missing input parameter | 00:00:00 |
| TC_PMS_definePolicy_21 | Pms_DefinePolicy_Missing_InputParameter_policyGroupName | Define Policy without policygroupname | 00:00:00 |
| TC_PMS_definePolicy_22 | Pms_DefinePolicy_Missing_InputParameter_policyType | Define policy without policy type | 00:00:00 |
| TC_PMS_definePolicy_14 | Pms_DefinePolicy_PolicyGrpInActive_InValid_Neg | Define policy for Inactive policy group | 00:00:00 |
| TC_PMS_definePolicy_13 | Pms_DefinePolicy_PolicyGrpNotExists_InValid | Define policy for non existing policygroup | 00:00:00 |
| TC_PMS_definePolicy_09 | Pms_DefinePolicy_RandomTokenType_All_Valid_Smoke_sid | Define Policy for random AuthTypeToken | 00:00:00 |
| TC_PMS_definePolicy_11 | Pms_DefinePolicy_Remove_Demo_Neg | Define Policy without demo | 00:00:00 |
| TC_PMS_definePolicy_26 | Pms_DefinePolicy_demo_All_Valid_Smoke_sid | Define policy | 00:00:00 |
| TC_PMS_definePolicy_24 | Pms_DefinePolicy_when_authTokenType_invalid | Define policy with invalid authtokentype | 00:00:00 |
| TC_PMS_definePolicy_25 | Pms_DefinePolicy_when_authTokenType_missing | Define policy without authtoken type | 00:00:01 |
| TC_PMS_definePolicy_23 | Pms_DefinePolicy_when_authTokenType_null | Define policy without authtoken type | 00:00:00 |
| TC_PMS_definePolicy_07 | Pms_DefinePolicy_without_AuthTypeToken | DefinePolicy without AuthTypeToken | 00:00:00 |
| PublishPolicy — Passed | |||
| Pms_PublishPolicy_All_Valid_ForNeg | Publish The Policy | 00:00:00 | |
| Pms_PublishPolicy_All_Valid_Smoke | Publish The Policy | 00:00:00 | |
| Pms_PublishPolicy_All_Valid_forDeactivatePolicyGroup_ForNeg | Publish The Policy for deactivate policy group with published policy | 00:00:00 | |
| Pms_PublishPolicy_ForDeactive_All_Valid_Smoke | Publish The Policy | 00:00:00 | |
| Pms_PublishPolicy_InValid_AlreadyPublished_neg | Publish The Policy which is already published | 00:00:00 | |
| Pms_PublishPolicy_InValid_policyId_neg | Publish The Policy with invalid policyid | 00:00:00 | |
| Pms_PublishPolicy_InValid_policygroupId_neg | Publish The Policy with invalid policygroupid | 00:00:00 | |
| Pms_PublishPolicy_invalid_auth_neg | Publish The Policy without access token | 00:00:00 | |
| GetAllActivePolicyGroups — Passed | |||
| TC_PMS_GetAllActivePolicyGroups_01 | Pms_GetAllActivePolicyGroups_All_Valid_Smoke | Fetching all the active PolicyGroups | 00:00:01 |
| TC_PMS_GetAllActivePolicyGroups_03 | Pms_GetAllActivePolicyGroups_Invalid_auth | Fetching all the active PolicyGroups with invalid token | 00:00:00 |
| TC_PMS_GetAllActivePolicyGroups_02 | Pms_GetAllActivePolicyGroups_without_auth | Fetching all the active PolicyGroups without token | 00:00:00 |
| GetAllApiKeyForAuthPartnerWithoutPartnerRegister — Passed | |||
| Pms_GetAllApiKeyForAuthPartner_withoutPartnerRegister_Neg | Fetching all the API Key Without Partner Register | 00:00:00 | |
| GetAllApprovedPartnerIdBeforePartnerCreate — Passed | |||
| Pms_GetAllApprovedAuthPartnerId_BeforePartnerCreate_Neg | Fetching all approved Partner Id | 00:00:00 | |
| CreatePartner — known_issues | |||
| TC_PMS_createPartnerSelfRegistration_05 | Pms_PartnerSelfRegistration_Invalid_Request_Time_Neg | Creating a Partner with invalid request time | 00:00:00 |
| TC_PMS_createPartnerSelfRegistration_04 | Pms_PartnerSelfRegistration_Missing_Request_Time_Neg | Creating a Partner with missing request time | 00:00:00 |
| CreatePartner — Passed | |||
| TC_PMS_createPartnerSelfRegistration_08 | Pms_PartnerSelfRegistrationFor_PartnerAdmin_All_Valid_Smoke | Creating a Partner | 00:00:00 |
| TC_PMS_createPartnerSelfRegistration_01 | Pms_PartnerSelfRegistration_All_Valid_Smoke | Creating a Partner | 00:00:00 |
| TC_PMS_createPartnerSelfRegistration_06 | Pms_PartnerSelfRegistration_Device_provider_All_Valid_Smoke | Creating a Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_07 | Pms_PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke | Creating a Partner | 00:00:00 |
| TC_PMS_createPartnerSelfRegistration_03 | Pms_PartnerSelfRegistration_Missing_Email_Neg | Creating a Partner | 00:00:00 |
| TC_PMS_createPartnerSelfRegistration_02 | Pms_PartnerSelfRegistration_reuse_same_Email_Neg | Creating a Partner | 00:00:00 |
| GetAllApiKeyForAuthPartnerWithoutPartnerCertifcates — Passed | |||
| Pms_GetAllApiKeyForAuthPartner_withoutuploadCert_Neg | Fetching all the API Key Without Partner Register | 00:00:00 | |
| VerifyPartnersEmail — Passed | |||
| TC_PMS_VerifyPartnersEmail_01 | Pms_VerifyPartnersEmail_AllValid_smoke | Verify Partners Email | 00:00:00 |
| TC_PMS_VerifyPartnersEmail_03 | Pms_VerifyPartnersEmail_Device_Provider_AllValid_smoke | Verify Partners Email | 00:00:00 |
| TC_PMS_VerifyPartnersEmail_07 | Pms_VerifyPartnersEmail_Ftm_Provider_AllValid_smoke | Verify Partners Email | 00:00:00 |
| TC_PMS_VerifyPartnersEmail_06 | Pms_VerifyPartnersEmail_invalid_email_neg | Verify Partners Email | 00:00:00 |
| TC_PMS_VerifyPartnersEmail_05 | Pms_VerifyPartnersEmail_missing_email_neg | Verify Partners Email | 00:00:00 |
| TC_PMS_VerifyPartnersEmail_04 | Pms_VerifyPartnersEmail_without_auth_neg | Verify Partners Email | 00:00:00 |
| UploadCACertificate — Failed | |||
| TC_PMS_UploadCACertificate_06 | Pms_UploadCACertificate_with_invalid_data | Upload CA Cert with invalid data | 00:00:00 |
| UploadCACertificate — Passed | |||
| TC_PMS_UploadCACertificate_01 | Pms_UploadCACertificate_All_Valid_Smoke | Upload CA Cert | 00:00:00 |
| TC_PMS_UploadCACertificate_05 | Pms_UploadCACertificate_UploadAgain_Neg | Upload CA Cert which is already uploaded | 00:00:00 |
| TC_PMS_UploadCACertificate_07 | Pms_UploadCACertificate_with_blank_data | Upload CA Cert with blank data | 00:00:00 |
| TC_PMS_UploadCACertificate_03 | Pms_UploadCertificateDeviceProvider_with_All_Valid_Smoke | Upload CA Cert | 00:00:00 |
| TC_PMS_UploadCACertificate_08 | Pms_UploadCertificate_Ftm_Provider_with_All_Valid_Smoke | Upload CA Cert | 00:00:00 |
| TC_PMS_UploadCACertificate_04 | Pms_UploadSubCACertificate_DeviceProvider_All_Valid_Smoke | Upload Sub-CA Cert | 00:00:00 |
| TC_PMS_UploadCACertificate_09 | Pms_UploadSubCACertificate_Ftm_Provider_All_Valid_Smoke | Upload Sub-CA Cert | 00:00:00 |
| TC_PMS_UploadCACertificate_02 | Pms_UploadSubCACertificate_with_All_Valid_Smoke | Upload Sub-CA Cert | 00:00:00 |
| GetAllCertificateBeforeCACertificateUpload — Passed | |||
| TC_PMS_GetAllCertificateBeforeCACertificateUpload_01 | Pms_GetAllCertificate_BeforeCACertificates_upload_neg | Fetching all the API certificates of the Logged in Partner | 00:00:00 |
| GetOriginalPartnerCertificatesBeforeCertificateUpload — Passed | |||
| TC_PMS_getPartner_certificate_08 | Pms_GetOriginalPartnerCertificates_before_certificate_upload | Get original Auth partner certificates before certificate upload | 00:00:00 |
| UploadPartnerCertificate — Passed | |||
| TC_PMS_uploadPartnerCert_01 | Pms_UploadPartnerCert_All_Valid_Smoke | Upload Partner Cert | 00:00:01 |
| TC_PMS_uploadPartnerCert_07 | Pms_UploadPartnerCert_UploadAgain_Neg | Upload partner certificate again | 00:00:00 |
| TC_PMS_uploadPartnerCert_06 | Pms_UploadPartnerCert_invalid_Domain_Neg | Upload Partner Cert by giving invalid domain | 00:00:00 |
| TC_PMS_uploadPartnerCert_05 | Pms_UploadPartnerCert_invalid_certificate_Neg | Upload Partner Cert by giving invalid cert data | 00:00:00 |
| TC_PMS_uploadPartnerCert_04 | Pms_UploadPartnerCert_missing_PartnerDomain_Neg | Upload Partner Cert without partnerdomain | 00:00:00 |
| TC_PMS_uploadPartnerCert_03 | Pms_UploadPartnerCert_uploadCertificateDeviceProvider_All_Valid_Smoke | Upload Partner Cert | 00:00:01 |
| TC_PMS_uploadPartnerCert_08 | Pms_UploadPartnerCert_uploadCertificateFtmProvider_All_Valid_Smoke | Upload Partner Cert | 00:00:00 |
| GetPartnerCertificate — Passed | |||
| Pms_GetPartnerCert_All_Valid_Smoke | Fetching all the certificate for the Partner Id | 00:00:00 | |
| Pms_GetPartnerCert_DeviceProvider_All_Valid_Smoke | Fetching all the certificate for the Partner Id | 00:00:00 | |
| Pms_GetPartnerCert_FtmProvider_All_Valid_Smoke | Fetching all the certificate for the Partner Id | 00:00:00 | |
| TC_PMS_GetPartnerCert_03 | Pms_GetPartnerCert_with_unregistered_partner_neg | Fetching all the certificate for the Partner Id | 00:00:00 |
| GetAllCertificate — Passed | |||
| TC_PMS_GetAllCertificate_02 | Pms_GetAllCertificate_Device_allValid_smoke | Fetching all the API certificates of the Loggedin Partner | 00:00:00 |
| TC_PMS_GetAllCertificate_01 | Pms_GetAllCertificate_allValid_smoke | Fetching all the API certificates of the Logged in Partner | 00:00:00 |
| TC_PMS_GetAllCertificate_04 | Pms_GetAllCertificate_invalid_auth | Fetching all the API certificates of the partner invalid partner | 00:00:00 |
| TC_PMS_GetAllCertificate_03 | Pms_GetAllCertificate_without_auth | Fetching all the API certificates of the partner without login | 00:00:00 |
| GetAllApprovedPartnerId — Passed | |||
| TC_PMS_GetAllApprovedAuthPartnerId_01 | Pms_GetAllApprovedAuthPartnerId_allValid_smoke | Fetching all approved Partner Id | 00:00:00 |
| GetAllApprovedPartnerIdWithoutAuthentication — Passed | |||
| TC_PMS_GetAllApprovedAuthPartnerId_02 | Pms_GetAllApprovedAuthPartnerId_invalid_auth | Fetching all approved Partner Id with invalid token | 00:00:00 |
| TC_PMS_GetAllApprovedAuthPartnerId_01 | Pms_GetAllApprovedAuthPartnerId_without_auth | Fetching all approved Partner Id without token | 00:00:00 |
| GetAllApiKeyForAuthPartnerBeforePolicyMapping — Passed | |||
| Pms_GetAllApiKeyForAuthPartner_BeforePolicyMapping_Neg | Fetching all the API Key Without Partner Register | 00:00:00 | |
| GetAllRequestedPolicyBeforeMapping — Passed | |||
| TC_PMS_GetAllRequestedPolicies_01 | Pms_GetAllRequestedPolicies_All_Valid_Smoke | Fetching all the Requested Policies | 00:00:00 |
| partnerPolicyMapping — Passed | |||
| Pms_partnerPolicyMapping_All_Valid_Smoke_sid | Mapping Partner & Policy | 00:00:00 | |
| Pms_partnerPolicyMapping_ForDeactivateOIDCNeg_All_Valid_Smoke_sid | Mapping Partner & Policy | 00:00:00 | |
| Pms_partnerPolicyMapping_invalid_partnerId | Mapping Partner & Policy when invalid partnerId is given | 00:00:00 | |
| Pms_partnerPolicyMapping_invalid_policyName | Mapping Partner & Policy when invalid policyname is given | 00:00:00 | |
| Pms_partnerPolicyMapping_missing_policyName | Mapping Partner & Policy when policyname is removed from request | 00:00:00 | |
| Pms_partnerPolicyMapping_missing_useCaseDescription | Mapping Partner & Policy when usecaseDescription is removed from request | 00:00:00 | |
| ApproveMappingKey — known_issues | |||
| Pms_ApproveMappingKey_Invalid_Request_Time_Neg | Approve the Mapping Key | 00:00:00 | |
| Pms_ApproveMappingKey_Missing_Request_Time_Neg | Approve the Mapping Key | 00:00:00 | |
| ApproveMappingKey — Passed | |||
| Pms_ApproveMappingKey_All_Valid_Smoke | Approve the Mapping Key | 00:00:00 | |
| Pms_ApproveMappingKey_ForDeactivateOIDCNeg_All_Valid_Smoke | Approve the Mapping Key | 00:00:00 | |
| Pms_ApproveMappingKey_Missing_mapping_key_Neg | Approve the Mapping Key | 00:00:00 | |
| Pms_ApproveMappingKey_Missing_status_Neg | Approve the Mapping Key | 00:00:00 | |
| GetAllRequestedPolicy — Passed | |||
| TC_PMS_GetAllRequestedPolicies_01 | Pms_GetAllRequestedPolicies_All_Valid_Smoke | Fetching all the Requested Policies | 00:00:00 |
| GetAllRequestedPolicyAuthvalidations — Passed | |||
| TC_PMS_GetAllRequestedPolicies_02 | Pms_GetAllRequestedPolicies_invalid_auth | Fetching all the Requested Policies with invalid role | 00:00:00 |
| TC_PMS_GetAllRequestedPolicies_01 | Pms_GetAllRequestedPolicies_without_auth | Fetching all the Requested Policies without login token | 00:00:00 |
| GetAllApprovedAuthPartnerPolicy — Passed | |||
| TC_PMS_GetAllApprovedAuthPartnerPolicy_01 | Pms_GetAllApprovedAuthPartnerPolicy_All_Valid_Smoke | Fetching all Approved Auth Partner Policies | 00:00:00 |
| GetAllApprovedAuthPartnerPolicyAuthValidations — Passed | |||
| TC_PMS_GetAllApprovedAuthPartnerPolicy_02 | Pms_GetAllApprovedAuthPartnerPolicy_invalid_auth | Fetching all Approved Auth Partner Policies with invalid token | 00:00:00 |
| TC_PMS_GetAllApprovedAuthPartnerPolicy_01 | Pms_GetAllApprovedAuthPartnerPolicy_without_auth | Fetching all Approved Auth Partner Policies without token | 00:00:00 |
| GetAllApiKeyForAuthPartnerBeforeApikeyGenerated — Passed | |||
| Pms_GetAllApiKeyForAuthPartner_BeforeApiKeyGenerated_Neg | Fetching all the API Key Without Partner Register | 00:00:00 | |
| GenerateApiKey — known_issues | |||
| TC_PMS_GenerateApikey_04 | Pms_GenerateApiKey_Invalid_Request_time_Neg | Generating an API Key | 00:00:00 |
| TC_PMS_GenerateApikey_03 | Pms_GenerateApiKey_Missing_Request_time_Neg | Generating an API Key | 00:00:00 |
| GenerateApiKey — Passed | |||
| TC_PMS_GenerateApikey_01 | Pms_GenerateApiKey_AllValid_smoke_sid | Generating an API Key | 00:00:00 |
| TC_PMS_GenerateApikey_05 | Pms_GenerateApiKey_Missing_label_Neg | Generating an API Key | 00:00:00 |
| TC_PMS_GenerateApikey_06 | Pms_GenerateApiKey_Missing_policyName_Neg | Generating an API Key | 00:00:00 |
| TC_PMS_GenerateApikey_02 | Pms_GenerateApiKey_Regenerate_Same_Key_Neg | Generating an API Key | 00:00:00 |
| ActivateDeactivatePartnerApiKey — Passed | |||
| Pms_ActivateDeactivatePartnerApiKey_activate_allValid_smoke | Activating Partner API Key | 00:00:00 | |
| GetAllApiKeyForAuthPartner — Passed | |||
| TC_PMS_GetAllApikeyForAuthPartner_01 | Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke | Fetching all the API Key available for Auth Partner | 00:00:00 |
| TC_PMS_GetAllApikeyForAuthPartner_03 | Pms_GetAllApiKeyForAuthPartner_invalid_auth | Fetching all the API Key available for Auth Partner with invalid token | 00:00:00 |
| TC_PMS_GetAllApikeyForAuthPartner_02 | Pms_GetAllApiKeyForAuthPartner_without_auth | Fetching all the API Key available for Auth Partner without token | 00:00:00 |
| GetAllApiKeyForAuthPartnerAfterDeactive — Passed | |||
| TC_PMS_GetAllApikeyForAuthPartner_01 | Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke | Fetching all the API Key available for Auth Partner | 00:00:00 |
| TC_PMS_GetAllApikeyForAuthPartner_03 | Pms_GetAllApiKeyForAuthPartner_invalid_auth | Fetching all the API Key available for Auth Partner with invalid token | 00:00:00 |
| TC_PMS_GetAllApikeyForAuthPartner_02 | Pms_GetAllApiKeyForAuthPartner_without_auth | Fetching all the API Key available for Auth Partner without token | 00:00:00 |
| GetAllPartnerPolicyRequest — Passed | |||
| TC_PMS_partner-policy-requests_01 | Pms_GetAllPartnerPolicyRequest_All_Valid_Smoke | Fetching all the partner policy requests | 00:00:00 |
| TC_PMS_partner-policy-requests_07 | Pms_GetAllPartnerPolicyRequest_With_policyId_given | Fetching all the partner policy requests for policyId which contains '2' | 00:00:00 |
| TC_PMS_partner-policy-requests_22 | Pms_GetAllPartnerPolicyRequest_with_combination_search_twofields | Fetching all the partner policy requests by giving value for partnerId and requestDetails | 00:00:00 |
| TC_PMS_partner-policy-requests_05 | Pms_GetAllPartnerPolicyRequest_with_orgname_given | Fetching all the partner policy requests for orgName which contains '1' | 00:00:00 |
| TC_PMS_partner-policy-requests_19 | Pms_GetAllPartnerPolicyRequest_with_pageNo_given | Fetching all the partner policy requests by giving valid page number given | 00:00:00 |
| TC_PMS_partner-policy-requests_04 | Pms_GetAllPartnerPolicyRequest_with_partnerId_given | Fetching all the partner policy requests for PartnerId which contains 'a' | 00:00:00 |
| TC_PMS_partner-policy-requests_10 | Pms_GetAllPartnerPolicyRequest_with_partnerType_given | Fetching all the partner policy requests for partnerType which contains 'a' | 00:00:00 |
| TC_PMS_partner-policy-requests_09 | Pms_GetAllPartnerPolicyRequest_with_policygroupname_given | Fetching all the partner policy requests for policyGroupName which contains 'Group' | 00:00:00 |
| TC_PMS_partner-policy-requests_08 | Pms_GetAllPartnerPolicyRequest_with_policyname_given | Fetching all the partner policy requests for policyName which contains 'policy' | 00:00:00 |
| TC_PMS_partner-policy-requests_21 | Pms_GetAllPartnerPolicyRequest_with_random_value_given | Fetching all the partner policy requests by giving random value for partnerid | 00:00:00 |
| TC_PMS_partner-policy-requests_06 | Pms_GetAllPartnerPolicyRequest_with_requestDetails_given | Fetching all the partner policy requests for requestDetails which contains 'ab' | 00:00:00 |
| TC_PMS_partner-policy-requests_12 | Pms_GetAllPartnerPolicyRequest_with_sortType_ASC | Fetching all the partner policy requests by sort type ASC for the given sort field | 00:00:00 |
| TC_PMS_partner-policy-requests_11 | Pms_GetAllPartnerPolicyRequest_with_sortType_DESC | Fetching all the partner policy requests by sort type DESC for the given sort field | 00:00:00 |
| TC_PMS_partner-policy-requests_14 | Pms_GetAllPartnerPolicyRequest_with_status_Inprogress | Fetching all the partner policy requests for which status as Inprogress | 00:00:00 |
| TC_PMS_partner-policy-requests_15 | Pms_GetAllPartnerPolicyRequest_with_status_approved | Fetching all the partner policy requests for which status as approved | 00:00:00 |
| TC_PMS_partner-policy-requests_16 | Pms_GetAllPartnerPolicyRequest_with_status_rejected | Fetching all the partner policy requests for which status as rejected | 00:00:00 |
| GetAllPartnerPolicyRequestNegativeScenarios — Passed | |||
| TC_PMS_partner-policy-requests_03 | Pms_GetAllPartnerPolicyRequest_Invalid_Token_Neg | Fetching all the partner policy requests with invalid token | 00:00:00 |
| TC_PMS_partner-policy-requests_18 | Pms_GetAllPartnerPolicyRequest_invalid_pageNo_Neg | Fetching all the partner policy requests by giving negative pageNo value | 00:00:00 |
| TC_PMS_partner-policy-requests_17 | Pms_GetAllPartnerPolicyRequest_invalid_pageSize_Neg | Fetching all the partner policy requests by giving negative pagesize value | 00:00:00 |
| TC_PMS_partner-policy-requests_20 | Pms_GetAllPartnerPolicyRequest_invalid_sortFieldName_Neg | Fetching all the partner policy requests with invalid sortfieldname | 00:00:00 |
| TC_PMS_partner-policy-requests_13 | Pms_GetAllPartnerPolicyRequest_invalid_sortType_Neg | Fetching all the partner policy requests by invalid sort type | 00:00:00 |
| TC_PMS_partner-policy-requests_02 | Pms_GetAllPartnerPolicyRequest_without_Authentication_Neg | Fetching all the partner policy requests without authentication | 00:00:00 |
| GetListOfPartners — Passed | |||
| TC_PMS_GetListOfPartners_01 | Pms_GetListOfPartners_All_Valid_Smoke | Fetching all the active List Of Partnered in the system | 00:00:00 |
| TC_PMS_GetListOfPartners_02 | Pms_GetListOfPartners_All_Valid_Smoke_admin_dashboard | Fetching all the active List Of Partnered in the system | 00:00:00 |
| TC_PMS_GetListOfPartners_05 | Pms_GetListOfPartners_Invalid_token_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 |
| TC_PMS_GetListOfPartners_09 | Pms_GetListOfPartners_empty_pageno_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 |
| Pms_GetListOfPartners_empty_partnerid_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 | |
| Pms_GetListOfPartners_empty_partnertype_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 | |
| TC_PMS_GetListOfPartners_08 | Pms_GetListOfPartners_invalid_pageno_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 |
| TC_PMS_GetListOfPartners_10 | Pms_GetListOfPartners_invalid_pagesize_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 |
| Pms_GetListOfPartners_invalid_partnerid_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 | |
| Pms_GetListOfPartners_invalid_partnertype_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 | |
| TC_PMS_GetListOfPartners_06 | Pms_GetListOfPartners_invalid_sortfield_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 |
| TC_PMS_GetListOfPartners_07 | Pms_GetListOfPartners_invalid_sorttype_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 |
| Pms_GetListOfPartners_with_deactivated_partner_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 | |
| Pms_GetListOfPartners_with_empty_emailAddress_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 | |
| Pms_GetListOfPartners_with_empty_organization_name_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 | |
| Pms_GetListOfPartners_with_empty_policyGroup_Name_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 | |
| TC_PMS_GetListOfPartners_04 | Pms_GetListOfPartners_with_empty_sort_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 |
| Pms_GetListOfPartners_with_invalid_email_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 | |
| Pms_GetListOfPartners_with_invalid_organization_name_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 | |
| Pms_GetListOfPartners_with_invalid_policyGroup_Name_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 | |
| TC_PMS_GetListOfPartners_03 | Pms_GetListOfPartners_with_invalid_sort_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 |
| Pms_GetListOfPartners_with_not_uploaded_email_Neg | Fetching all the active List Of Partner with invalid sort | 00:00:00 | |
| GetDetailsOfPartner — Failed | |||
| Pms_GetDetailsOfPartner_without_admin_role_Neg | Fetching all the details of the Partner Id | 00:00:00 | |
| GetDetailsOfPartner — Passed | |||
| Pms_GetDetailsOfPartner_All_Valid_Smoke | Fetching all the details of the Partner Id | 00:00:00 | |
| Pms_GetDetailsOfPartner_invalid_token_Neg | Fetching all the details of the Partner Id | 00:00:00 | |
| Pms_GetDetailsOfPartner_with_admin_role_Neg | Fetching all the details of the Partner Id | 00:00:00 | |
| Pms_GetDetailsOfPartner_with_invalid_partner_Neg | Fetching all the details of the Partner Id | 00:00:00 | |
| Pms_GetDetailsOfPartner_with_unauthor_token_Neg | Fetching all the details of the Partner Id | 00:00:00 | |
| Pms_GetDetailsOfPartner_with_unauthorized_token_Neg | Fetching all the details of the Partner Id | 00:00:00 | |
| GetListOfPolicies — Passed | |||
| TC_PMS_listofPolicies_01 | Pms_GetListOfPolicies_All_Valid_Smoke | Fetching all the active List Of Policies in the system | 00:00:00 |
| TC_PMS_listofPolicies_02 | Pms_GetListOfPolicies_invalid_token_neg | Fetching all the active List Of Policies invalid token | 00:00:00 |
| TC_PMS_listofPolicies_21 | Pms_GetListOfPolicies_with_combination_twoattributes_valid | Fetching all the active List Of Policies with policyName and policyid given | 00:00:00 |
| TC_PMS_listofPolicies_08 | Pms_GetListOfPolicies_with_negative_pageNo_neg | Fetching all the active List Of Policies with pageNo as '-6' | 00:00:00 |
| TC_PMS_listofPolicies_09 | Pms_GetListOfPolicies_with_negative_pageSize_neg | Fetching all the active List Of Policies with pageSize as '-6' | 00:00:00 |
| TC_PMS_listofPolicies_10 | Pms_GetListOfPolicies_with_pageNo_specified_valid | Fetching all the active List Of Policies with pageNo as '6' | 00:00:00 |
| TC_PMS_listofPolicies_07 | Pms_GetListOfPolicies_with_pagesize_specified_valid | Fetching all the active List Of Policies with pageSize as '6' | 00:00:00 |
| TC_PMS_listofPolicies_20 | Pms_GetListOfPolicies_with_policyDescription_random_invalid_neg | Fetching all the active List Of Policies with policyDescription as '3fdfds' | 00:00:00 |
| TC_PMS_listofPolicies_17 | Pms_GetListOfPolicies_with_policyDescription_valid | Fetching all the active List Of Policies with policyDescription as 'a' | 00:00:00 |
| TC_PMS_listofPolicies_16 | Pms_GetListOfPolicies_with_policyGroupName_valid | Fetching all the active List Of Policies with policyGroupName as 'ab' | 00:00:00 |
| TC_PMS_listofPolicies_14 | Pms_GetListOfPolicies_with_policyId_valid | Fetching all the active List Of Policies with policyId as '1' | 00:00:00 |
| TC_PMS_listofPolicies_15 | Pms_GetListOfPolicies_with_policyName_valid | Fetching all the active List Of Policies with policyName as 'a' | 00:00:00 |
| TC_PMS_listofPolicies_19 | Pms_GetListOfPolicies_with_sortFieldName_invalid_neg | Fetching all the active List Of Policies with sortFieldName as 'status' as per given sorttype | 00:00:00 |
| TC_PMS_listofPolicies_18 | Pms_GetListOfPolicies_with_sortFieldName_valid | Fetching all the active List Of Policies with sortFieldName as 'status' as per given sorttype | 00:00:00 |
| TC_PMS_listofPolicies_11 | Pms_GetListOfPolicies_with_sortType_asc | Fetching all the active List Of Policies with sortType as 'asc' | 00:00:00 |
| TC_PMS_listofPolicies_12 | Pms_GetListOfPolicies_with_sortType_desc | Fetching all the active List Of Policies with sortType as 'desc' | 00:00:00 |
| TC_PMS_listofPolicies_13 | Pms_GetListOfPolicies_with_sortType_invalid_neg | Fetching all the active List Of Policies with sortType as 'abdcfegff' | 00:00:00 |
| TC_PMS_listofPolicies_04 | Pms_GetListOfPolicies_with_status_activated | Fetching all the active List Of Policies with status as 'activated' | 00:00:00 |
| TC_PMS_listofPolicies_05 | Pms_GetListOfPolicies_with_status_deactivated | Fetching all the active List Of Policies with status as 'deactivated' | 00:00:00 |
| TC_PMS_listofPolicies_06 | Pms_GetListOfPolicies_with_status_draft | Fetching all the active List Of Policies with status as 'draft' | 00:00:00 |
| TC_PMS_listofPolicies_03 | Pms_GetListOfPolicies_without_Authentication_neg | Fetching all the active List Of Policies without authentication | 00:00:00 |
| GetListOfPoliciesRequest — Passed | |||
| Pms_GetListOfPolicies_All_Valid_Smoke | Fetching all the active List Of Policies Request in the system | 00:00:02 | |
| GetAllOidcClientBeforeOIDCCreation — Passed | |||
| TC_PMS_GetAllOidcClient_01 | Pms_GetAllOidcClient_All_Valid_Smoke | Fetching all OIDC Clients of the loggedin Partner | 00:00:00 |
| OAuthClient — Failed | |||
| Pms_CreateOIDCClient_ForNeg_all_Valid_sid | Creating OAUTH Client | 00:00:00 | |
| Pms_CreateOIDCClient_all_Valid_Smoke_sid | Creating OAUTH Client | 00:00:00 | |
| Pms_CreateOIDCClient_invalid_RedirectUri_neg | Creating OAUTH Client with invalid redirectUri | 00:00:00 | |
| Pms_CreateOIDCClient_invalid_granttypes_neg | Creating OAUTH Client with invalid granttypes | 00:00:00 | |
| OAuthClient — Passed | |||
| Pms_CreateOIDCClient_invalid_auth_neg | Creating OAUTH Client without token | 00:00:00 | |
| Pms_CreateOIDCClient_invalid_logoUri_neg | Creating OAUTH Client with invalid logoUri | 00:00:00 | |
| Pms_CreateOIDCClient_invalid_policyID_neg | Creating OAUTH Client with invalid policyid | 00:00:00 | |
| Pms_CreateOIDCClient_invalid_publickey_neg | Creating OAUTH Client with invalid publickkey | 00:00:00 | |
| Pms_CreateOIDCClient_without_granttypes_neg | Creating OAUTH Client without granttypes | 00:00:00 | |
| Pms_CreateOIDCClient_without_name_neg | Creating OAUTH Client without name field | 00:00:00 | |
| Pms_CreateOIDCClient_without_publickey_neg | Creating OAUTH Client without publickkey | 00:00:00 | |
| GetAllOauthClient — Passed | |||
| Pms_GetAllOauthClient_All_Valid_Smoke | Fetching all OIDC Clients of the loggedin Partner | 00:00:00 | |
| UpdateOAuthClient — Skipped | |||
| Pms_UpdateOIDCClient_all_Valid_Smoke_sid | 00:00:00 | ||
| GetAllOidcClient — Passed | |||
| TC_PMS_GetAllOidcClient_01 | Pms_GetAllOidcClient_All_Valid_Smoke | Fetching all OIDC Clients of the loggedin Partner | 00:00:00 |
| GetAllOidcClientWithoutAuthentication — Passed | |||
| TC_PMS_GetAllOidcClient_02 | Pms_GetAllOidcClient_Invalid_Auth | Fetching all OIDC Clients of the loggedin Partner | 00:00:00 |
| TC_PMS_GetAllOidcClient_01 | Pms_GetAllOidcClient_without_Auth | Fetching all OIDC Clients of the loggedin Partner | 00:00:00 |
| DeactivateOIDCClient — known_issues | |||
| TC_PMS_DeactivateOIDCClient_03 | Pms_DeactivateOIDCClient_Missing_Requesttime_Neg | Deactivating The Oidc Client | 00:00:00 |
| TC_PMS_DeactivateOIDCClient_11 | Pms_DeactivateOIDCClient_Missing_clientAuthMethods_Neg | Deactivating The Oidc Client | 00:00:00 |
| TC_PMS_DeactivateOIDCClient_09 | Pms_DeactivateOIDCClient_Missing_grantTypes_Neg | Deactivating The Oidc Client | 00:00:00 |
| DeactivateOIDCClient — Skipped | |||
| TC_PMS_DeactivateOIDCClient_10 | Pms_DeactivateOIDCClient_Missing_clientNameLangMap_Neg | Deactivating The Oidc Client | 00:00:00 |
| TC_PMS_DeactivateOIDCClient_05 | Pms_DeactivateOIDCClient_Missing_clientName_Neg | Deactivating The Oidc Client | 00:00:00 |
| TC_PMS_DeactivateOIDCClient_07 | Pms_DeactivateOIDCClient_Missing_logoUri_Neg | Deactivating The Oidc Client | 00:00:00 |
| TC_PMS_DeactivateOIDCClient_08 | Pms_DeactivateOIDCClient_Missing_redirectUris_Neg | Deactivating The Oidc Client | 00:00:00 |
| TC_PMS_DeactivateOIDCClient_06 | Pms_DeactivateOIDCClient_Missing_status_Neg | Deactivating The Oidc Client | 00:00:00 |
| TC_PMS_DeactivateOIDCClient_02 | Pms_DeactivateOIDCClient_Retry_with_Deactivated_ClientId_Neg | Deactivating The Oidc Client | 00:00:00 |
| TC_PMS_DeactivateOIDCClient_01 | Pms_DeactivateOIDCClient_all_Valid_Smoke_sid | Deactivating The Oidc Client | 00:00:00 |
| DeactivateOIDCClient — Passed | |||
| TC_PMS_DeactivateOIDCClient_04 | Pms_DeactivateOIDCClient_Missing_client_id_Neg | Deactivating The Oidc Client | 00:00:00 |
| GetAllOidcClientAfterDeactivateOfOIDC — Passed | |||
| TC_PMS_GetAllOidcClient_01 | Pms_GetAllOidcClient_All_Valid_Smoke | Fetching all OIDC Clients of the loggedin Partner | 00:00:00 |
| GetConfiguration — Passed | |||
| Partner_GetConfiguration_allValid_smoke | 00:00:00 | ||
| GetUserConsentBeforeConsentGiven — known_issues | |||
| TC_pms_GetUserConsent_05 | Pms_GetUserConsent_before_consent_given | Retrieve the PMS GetUserConsent before consent is saved | 00:00:00 |
| saveUserConsent — Passed | |||
| TC_PMS_saveUserConsent_01 | Pms_saveUserConsent_AllValid_Smoke | save User Consent | 00:00:00 |
| TC_PMS_saveUserConsent_02 | Pms_saveUserConsent_invalid_roles_Neg | save User Consent when authentication is done with invalid roles | 00:00:00 |
| TC_PMS_saveUserConsent_04 | Pms_saveUserConsent_invalid_user_Neg | save User Consent for invalid user | 00:00:00 |
| TC_PMS_saveUserConsent_03 | Pms_saveUserConsent_without_authentication_Neg | save User Consent without authentication | 00:00:00 |
| GetUserConsent — Passed | |||
| TC_pms_GetUserConsent_04 | Pms_GetUserConsent_Get_consent_status_invalid_auth_token_neg | Retrieve PMS GetUserConsent Status with an Invalid Auth Token | 00:00:00 |
| TC_pms_GetUserConsent_03 | Pms_GetUserConsent_Get_consent_status_invalid_user_neg | Retrieve the PMS GetUserConsent Status for invalid User and Expecting an Error in The Response | 00:00:00 |
| TC_pms_GetUserConsent_02 | Pms_GetUserConsent_Get_consent_status_without_access_token_neg | Retrieve the PMS GetUserConsent Status Without an Access Token and Expecting an Error in The Response | 00:00:00 |
| TC_pms_GetUserConsent_01 | Pms_GetUserConsent_allValid_smoke | Retrieve the PMS GetUserConsent for All Valid Smoke | 00:00:00 |
| GetOriginalPartnerCertificates — Failed | |||
| TC_PMS_getPartner_certificate_03 | Pms_GetOriginalPartnerCertificates_DeviceProvider_allValid_smoke | Get original ftm partner certificates | 00:00:00 |
| TC_PMS_getPartner_certificate_01 | Pms_GetOriginalPartnerCertificates_allValid_smoke | Get original Auth partner certificates | 00:00:00 |
| GetOriginalPartnerCertificates — Passed | |||
| TC_PMS_getPartner_certificate_04 | Pms_GetOriginalPartnerCertificates_invalid_roles_Neg | Get original Auth partner certificates when authenticated as device partner | 00:00:00 |
| TC_PMS_getPartner_certificate_06 | Pms_GetOriginalPartnerCertificates_random_partnerid_Neg | Get original Auth partner certificates random value for partnerid | 00:00:00 |
| TC_PMS_getPartner_certificate_07 | Pms_GetOriginalPartnerCertificates_without_authentication_Neg | Get original Auth partner certificates without authentication | 00:00:00 |
| TC_PMS_getPartner_certificate_05 | Pms_GetOriginalPartnerCertificates_without_partnerid_Neg | Get original Auth partner certificates without partnerid | 00:00:00 |
| GetAllApprovedDeviceProviderIds — Passed | |||
| TC_PMS_GetAllApprovedDeviceProviders_01 | Pms_GetAllApprovedDeviceProviderIds_allValid_smoke | Get All Approved Device ProviderId | 00:00:00 |
| GetAllApprovedDeviceProviderIdsNegativeScenarios — Passed | |||
| TC_PMS_GetAllApprovedDeviceProviderIds_02 | Pms_GetAllApprovedDeviceProviderIds_Invalid_Token_Neg | Retrieve All Approved Device ProviderIds with invalid access token | 00:00:00 |
| TC_PMS_GetAllApprovedDeviceProviderIds_01 | Pms_GetAllApprovedDeviceProviderIds_Without_Authentication_Neg | Retrieve All Approved Device ProviderIds Without Authentication | 00:00:00 |
| TC_PMS_GetAllApprovedDeviceProviderIds_04 | Pms_GetAllApprovedDeviceProviderIds_with_Admin_roles_Neg | Retrieve All Device ProviderIds with Admin roles | 00:00:00 |
| TC_PMS_GetAllApprovedDeviceProviderIds_03 | Pms_GetAllApprovedDeviceProviderIds_without_partner_roles_Neg | Retrieve All Approved Device ProviderIds without_partner_roles | 00:00:00 |
| SaveSecureBiometricInterfaceCreateDto — Passed | |||
| Pms_SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid | 00:00:00 | ||
| DeactivateSBIWithAssociatedDeviceswhichisPendingforApproval — Passed | |||
| TC_PMS_DeactivateSBIWithAssociatedDevices_21 | Pms_DeactivateSBIWithAssociatedDevices_all_Valid_Smoke_sid | Deactivate SBI which is pending for approval | 00:00:00 |
| UpdateSecureBiometricInterface — Passed | |||
| Pms_UpdateSecureBiometricInterface_DeviceProvider_AllValid_Smoke | 00:00:00 | ||
| GetSbiDetailsList — Passed | |||
| TC_pms_GetSbiDetailsList_01 | Pms_GetSbiDetailsList_All_Valid_Smoke | Retrieve the PMS GetSbiDetails List for All Valid Inputs | 00:00:00 |
| TC_pms_GetSbiDetailsList_03 | Pms_GetSbiDetailsList_get_partners_sbi_detail_API_with_Admin_roles_Neg | Retrieve Partner SBI Details with Admin Role and Expecting an Error in The Response | 00:00:00 |
| TC_pms_GetSbiDetailsList_04 | Pms_GetSbiDetailsList_get_response_without_Partner_roles_Neg | Retrieve Response Without Partner Role and Expecting an Error in The Response | 00:00:00 |
| TC_pms_GetSbiDetailsList_02 | Pms_GetSbiDetailsList_get_response_without_authorization_token_Neg | Retrieve responce without authorization taken and Expecting an Error in The Response | 00:00:00 |
| DeviceTypeFilter — Passed | |||
| TC_PMS_DeviceTypeFilter_01 | Pms_DeviceTypeFilter_All_Valid_Smoke | Device Type Filter | 00:00:00 |
| DeviceSubTypeFilter — Passed | |||
| TC_PMS_DeviceSubTypeFilter_01 | Pms_DeviceSubTypeFilter_All_Valid_Smoke | Device SubType Filter | 00:00:00 |
| SaveDeviceDetails — Passed | |||
| TC_PMS_SaveDeviceDetails_02 | Pms_SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid | Save Device Details | 00:00:00 |
| TC_PMS_SaveDeviceDetails_01 | Pms_SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid | Save Device Details | 00:00:00 |
| GetListOfAllSBI — Passed | |||
| TC_PMS_SBI_List_03 | Pms_GetListOfAllSBI_All_Valid_Smoke_sid | Fetching all the active SBI | 00:00:00 |
| TC_PMS_SBI_List_14 | Pms_GetListOfAllSBI_orgName_valid | Fetching all the active SBI with orgName contains '1' | 00:00:00 |
| TC_PMS_SBI_List_20 | Pms_GetListOfAllSBI_pagesize_given_valid | Fetching all the active SBI with pageSize specified | 00:00:00 |
| TC_PMS_SBI_List_15 | Pms_GetListOfAllSBI_partnerId_valid | Fetching all the active SBI with partnerId contains 'a' | 00:00:00 |
| TC_PMS_SBI_List_18 | Pms_GetListOfAllSBI_random_value_given | Fetching all the active SBI with random value for partnerId | 00:00:00 |
| TC_PMS_SBI_List_12 | Pms_GetListOfAllSBI_sbiExpiryStatus_expired | Fetching all the active SBI with sbiExpiryStatus as expired | 00:00:00 |
| TC_PMS_SBI_List_13 | Pms_GetListOfAllSBI_sbiExpiryStatus_valid | Fetching all the active SBI with sbiExpiryStatus as vaild | 00:00:00 |
| TC_PMS_SBI_List_12 | Pms_GetListOfAllSBI_sbiVersion_given | Fetching all the active SBI with sbiVersion | 00:00:00 |
| TC_PMS_SBI_List_15 | Pms_GetListOfAllSBI_sortType_ASC | Fetching all the active SBI with ASC | 00:00:00 |
| TC_PMS_SBI_List_17 | Pms_GetListOfAllSBI_sortType_DESC | Fetching all the active SBI with sbiVersion | 00:00:00 |
| TC_PMS_SBI_List_09 | Pms_GetListOfAllSBI_status_approved | Fetching all the active SBI with status as approved | 00:00:00 |
| TC_PMS_SBI_List_10 | Pms_GetListOfAllSBI_status_deactivated | Fetching all the active SBI with status as deactivated | 00:00:00 |
| TC_PMS_SBI_List_11 | Pms_GetListOfAllSBI_status_pending_approval | Fetching all the active SBI with status as pending_approval | 00:00:00 |
| TC_PMS_SBI_List_08 | Pms_GetListOfAllSBI_status_rejected | Fetching all the active SBI with status as rejected | 00:00:00 |
| ApproveMappingDeviceToSbi — Passed | |||
| TC_PMS_ApproveMappingDevice_01 | Pms_ApproveMappingDeviceToSbi_All_Valid_Smoke | Approve Mapping Device To Sbi | 00:00:00 |
| ApproveMappingDeviceToSbiNegativeScenarios — Passed | |||
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_01 | Pms_ApproveMappingDeviceToSbi_different_deviceDetails_Neg | Approve mapping device to sbi with different deviceDetails | 00:00:00 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_09 | Pms_ApproveMappingDeviceToSbi_which_is_already_approved_Neg | Approve mapping device to sbi by providing parameters which are already approved | 00:00:00 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_10 | Pms_ApproveMappingDeviceToSbi_with_Invalid_DeviceID_Neg | Approve mapping device to sbi by providing invalid Device ID | 00:00:00 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_13 | Pms_ApproveMappingDeviceToSbi_with_Invalid_Partner_Authentication_Neg | Approve mapping device to sbi with Invalid Partner Authentication | 00:00:00 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_11 | Pms_ApproveMappingDeviceToSbi_with_Invalid_SBIID_Neg | Approve mapping device to sbi by providing invalid SBI ID | 00:00:00 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_08 | Pms_ApproveMappingDeviceToSbi_with_missing_SBIID_Neg | Approve mapping device to sbi while keeping SBI ID parameter as missing | 00:00:00 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_06 | Pms_ApproveMappingDeviceToSbi_with_random_DeviceProviderID_Neg | Approve mapping device to sbi with randome Device provider Id | 00:00:00 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_12 | Pms_ApproveMappingDeviceToSbi_without_Partner_Authentication_Neg | Approve mapping device to sbi without Partner Authentication | 00:00:00 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_03 | Pms_ApproveMappingDeviceToSbi_without_Req_ID_Neg | Approve mapping device to sbi without Request ID | 00:00:00 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_07 | Pms_ApproveMappingDeviceToSbi_without_RequestTime_Neg | Approve mapping device to sbi without requestTime | 00:00:00 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_02 | Pms_ApproveMappingDeviceToSbi_without_SBI_ID_Neg | Approve mapping device to sbi without without sbiId value | 00:00:00 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_04 | Pms_ApproveMappingDeviceToSbi_without_Version_value_Neg | Approve mapping device to sbi without Version value | 00:00:00 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_05 | Pms_ApproveMappingDeviceToSbi_without_deviceProviderID_Neg | Approve mapping device to sbi without Device provider Id | 00:00:00 |
| RejectMappingDeviceToSbi — Passed | |||
| TC_PMS_RejectMappingDeviceToSbi_01 | Pms_RejectMappingDeviceToSbi_All_Valid_Smoke | Reject Mapping Device To Sbi | 00:00:00 |
| RejectMappingDeviceToSbiwhichisRejected — Passed | |||
| TC_PMS_RejectMappingDeviceToSbi_32 | Pms_RejectMappingDeviceToSbi_whichisRejected_Neg | Reject mapping device to sbi by providing SBI which is Rejected and expecting an error in response | 00:00:00 |
| RejectMappingDeviceToSbiNegativeScenarios — Passed | |||
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_03 | Pms_RejectMappingDeviceToSb_ReqID_Null_Neg | Reject mapping device to sbi while keeping ReqID parameter as Null in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_29 | Pms_RejectMappingDeviceToSbi_Empty_Device_ID_Neg | Reject mapping device to sbi while keeping device ID as Empty in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_19 | Pms_RejectMappingDeviceToSbi_Empty_Partner_ID_Neg | Reject mapping device to sbi while keeping Empty Partner ID in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_14 | Pms_RejectMappingDeviceToSbi_Empty_RequestTimeString_Neg | Reject mapping device to sbi while keeping RequestTime parameter as Empty string in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_13 | Pms_RejectMappingDeviceToSbi_Empty_RequestTime_Neg | Reject mapping device to sbi while keeping RequestTime parameter as Empty in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_23 | Pms_RejectMappingDeviceToSbi_Empty_SBI_ID_Neg | Reject mapping device to sbi while keeping Empty SBI ID in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_08 | Pms_RejectMappingDeviceToSbi_Empty_Version_Neg | Reject mapping device to sbi while keeping Version parameter as Empty in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_20 | Pms_RejectMappingDeviceToSbi_Invalid_SBI_ID_Neg | Reject mapping device to sbi while keeping Invalid SBI ID in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_10 | Pms_RejectMappingDeviceToSbi_Invalid_VersionValue0_Neg | Reject mapping device to sbi while keeping Version parameter as invalid value 0 in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_09 | Pms_RejectMappingDeviceToSbi_Invalid_VersionValue1_Neg | Reject mapping device to sbi while keeping Version parameter as invalid value 1 in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_11 | Pms_RejectMappingDeviceToSbi_Invalid_VersionValues_Neg | Reject mapping device to sbi while keeping Version parameter as invalid values in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_02 | Pms_RejectMappingDeviceToSbi_Missing_Req_ID_Neg | Reject mapping device to sbi while passing Invalid RequestID parameter in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_06 | Pms_RejectMappingDeviceToSbi_Missing_Version_Neg | Reject mapping device to sbi while keeping Version parameter as Missing in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_07 | Pms_RejectMappingDeviceToSbi_Null_Version_Neg | Reject mapping device to sbi while keeping Version parameter as Null in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_33 | Pms_RejectMappingDeviceToSbi_Provide_different_SBIID_Neg | Reject mapping device to sbi with different SBI ID and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_04 | Pms_RejectMappingDeviceToSbi_ReqID_Empty_Neg | Reject mapping device to sbi while keeping ReqID parameter as Empty in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_05 | Pms_RejectMappingDeviceToSbi_ReqID_Invalid_Neg | Reject mapping device to sbi while keeping ReqID parameter as Invalid in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_25 | Pms_RejectMappingDeviceToSbi_already_Rejected_mapped_ID_Neg | Reject mapping device to sbi while providing already rejeceted device ID in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_15 | Pms_RejectMappingDeviceToSbi_different_format_RequestTime_Neg | Reject mapping device to sbi while keeping RequestTime value other than given format in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_26 | Pms_RejectMappingDeviceToSbi_invalid_Device_ID_Neg | Reject mapping device to sbi while providing invalid device ID in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_30 | Pms_RejectMappingDeviceToSbi_invalid_Device_IDvalues_Neg | Reject mapping device to sbi while keeping device ID values in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_17 | Pms_RejectMappingDeviceToSbi_invalid_Partner_ID_Neg | Reject mapping device to sbi while keeping invalid Partner ID in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_16 | Pms_RejectMappingDeviceToSbi_invalid_object_paramter_Neg | Reject mapping device to sbi with invalid object paramter in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_28 | Pms_RejectMappingDeviceToSbi_null_Device_ID_Neg | Reject mapping device to sbi while keeping device ID as null in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_18 | Pms_RejectMappingDeviceToSbi_null_Partner_ID_Neg | Reject mapping device to sbi while keeping null Partner ID in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_22 | Pms_RejectMappingDeviceToSbi_null_SBI_ID_Neg | Reject mapping device to sbi while keeping null SBI ID in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_24 | Pms_RejectMappingDeviceToSbi_random_SBI_ID_Neg | Reject mapping device to sbi while keeping random SBI ID in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_31 | Pms_RejectMappingDeviceToSbi_with_Partner_Roles_Neg | Reject mapping device to sbi with Parter roles and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_27 | Pms_RejectMappingDeviceToSbi_with_different_Device_ID_Neg | Reject mapping device to sbi with different device ID in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_01 | Pms_RejectMappingDeviceToSbi_without_Partner_Auth_Neg | Reject mapping device to sbi without Partner Authentication and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_12 | Pms_RejectMappingDeviceToSbi_without_RequestTime_Neg | Reject mapping device to sbi without RequestTime parameter in request and expecting an error in response | 00:00:00 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_21 | Pms_RejectMappingDeviceToSbi_without_SBI_ID_Neg | Reject mapping device to sbi while keeping without SBI ID in request and expecting an error in response | 00:00:00 |
| ApproveMappingDeviceToSbiwhichisRejected — Passed | |||
| TC_PMS_ApproveMappingDevice_14 | Pms_ApproveMappingDeviceToSbi_whichisRejected_Neg | Approve Mapping Device To Sbi when SBI is Rejected | 00:00:00 |
| GetAllDeviceListMappedWithSbi — Passed | |||
| TC_PMS_GetAllDeviceListMappedwithSbi_01 | Pms_GetAllDeviceListMappedWithSbi_All_Valid_Smoke | Get All Device List Mapped With Sbi | 00:00:00 |
| GetAllDeviceListMappedWithSbiNegativeScenarios — Passed | |||
| TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_02 | Pms_GetAllDeviceListMappedWithSbi_Invalid_SBI_ID_Neg | Retrieve all Device list which are mapped with SBI by provinding invalid SBI id in request | 00:00:00 |
| TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_03 | Pms_GetAllDeviceListMappedWithSbi_when_SBI_not_authenticated_device_provider_SBI_ID_Neg | Retrieve all Device list when SBI given is different from the authentiacted device provider | 00:00:00 |
| TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_01 | Pms_GetAllDeviceListMappedWithSbi_without_authentication_Neg | Retrieve all Device list which are mapped with SBI without Authentication | 00:00:00 |
| DeactivateDevice — Passed | |||
| TC_PMS_DeactivateDevice_01 | Pms_DeactivateDevice_all_Valid_Smoke_sid | Deactivate Device | 00:00:00 |
| DeactivateDeviceNegativeScenarios — Passed | |||
| TC_PMS_DeactivateDevice_07 | Pms_DeactivateDevice_Already_deactivated_device_Neg | Deactivate Device which has been already Deactivated | 00:00:00 |
| TC_PMS_DeactivateDevice_05 | Pms_DeactivateDevice_Empty_requestTime_Neg | Deactivate Device while keeping requestTime paramter as Empty | 00:00:00 |
| TC_PMS_DeactivateDevice_04 | Pms_DeactivateDevice_Missing_requestTime_Neg | Deactivate Device while keeping requestTime paramter as Missing | 00:00:00 |
| TC_PMS_DeactivateDevice_09 | Pms_DeactivateDevice_with_Empty_Version_Neg | Deactivate Device while keeping Version parameter as Empty | 00:00:00 |
| TC_PMS_DeactivateDevice_02 | Pms_DeactivateDevice_with_Invalid_Device_ID_Neg | Deactivate Device by passing invalid Device ID | 00:00:00 |
| TC_PMS_DeactivateDevice_06 | Pms_DeactivateDevice_with_Invalid_RandomDevice_ID_Neg | Deactivate Device by passwing invalid Random Device ID | 00:00:00 |
| TC_PMS_DeactivateDevice_08 | Pms_DeactivateDevice_with_Invalid_Version_Neg | Deactivate Device by passing invalid Version | 00:00:00 |
| TC_PMS_DeactivateDevice_03 | Pms_DeactivateDevice_with_Invalid_requestTime_Neg | Deactivate Device by passing invalid requestTime | 00:00:00 |
| TC_PMS_DeactivateDevice_01 | Pms_DeactivateDevice_without_authentication_Neg | Deactivate Device without Partner authentication | 00:00:00 |
| DeactivateSBIWithAssociatedDevices — Passed | |||
| TC_PMS_DeactivateSBIWithAssociatedDevices_01 | Pms_DeactivateSBIWithAssociatedDevices_all_Valid_Smoke_sid | Deactivate SBI along with Associated Devices | 00:00:00 |
| DeactivateSBIWithAssociatedDevicesNegativeScenarios — Passed | |||
| TC_PMS_DeactivateSBIWithAssociatedDevices_15 | Pms_DeactivateSBIWithAssociatedDevices_Already_deactivated_SBI_Neg | Deactivate SBI which already Deactivated in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_07 | Pms_DeactivateSBIWithAssociatedDevices_Empty_ID_Neg | Deactivate SBI while keeping ID parameter as Empty in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_17 | Pms_DeactivateSBIWithAssociatedDevices_Empty_SBI_ID_Neg | Deactivate SBI while keeping SBI ID parameter as Empty in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_10 | Pms_DeactivateSBIWithAssociatedDevices_Empty_Version_Neg | Deactivate SBI while keeping Version parameter as Empty in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_03 | Pms_DeactivateSBIWithAssociatedDevices_Empty_requestTime_Neg | Deactivate SBI while keeping requestTime parameter as Empty in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_18 | Pms_DeactivateSBIWithAssociatedDevices_InvalidNumeric_SBI_ID_Neg | Deactivate SBI while keeping SBI ID parameter as Invalid Numeric values in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_04 | Pms_DeactivateSBIWithAssociatedDevices_Invalid_ID_Neg | Deactivate SBI by passing Invalid ID parameter in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_19 | Pms_DeactivateSBIWithAssociatedDevices_Invalid_SBI_ID_Neg | Deactivate SBI while keeping SBI ID parameter as Invalid values in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_12 | Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue0_Neg | Deactivate SBI while keeping Version parameter as invalid value 0 in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_11 | Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue1_Neg | Deactivate SBI while keeping Version parameter as invalid value 1 in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_13 | Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue_Neg | Deactivate SBI while keeping Version parameter as invalid values in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_14 | Pms_DeactivateSBIWithAssociatedDevices_Invalid_requestTime_Neg | Deactivate SBI while keeping Request Time parameter as invalid in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_06 | Pms_DeactivateSBIWithAssociatedDevices_Keeping_IDas_Null_Neg | Deactivate SBI while keeping ID parameter as Null in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_05 | Pms_DeactivateSBIWithAssociatedDevices_Missing_ID_Neg | Deactivate SBI while keeping ID parameter as Missing in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_08 | Pms_DeactivateSBIWithAssociatedDevices_Missing_Version_Neg | Deactivate SBI without Version parameter in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_02 | Pms_DeactivateSBIWithAssociatedDevices_Missing_requestTime_Neg | Deactivate SBI while keeping requestTime parameter as Missing in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_16 | Pms_DeactivateSBIWithAssociatedDevices_Null_SBI_ID_Neg | Deactivate SBI while keeping SBI ID parameter as Null in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_09 | Pms_DeactivateSBIWithAssociatedDevices_Null_Version_Neg | Deactivate SBI while keeping Version parameter as Null in request | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_01 | Pms_DeactivateSBIWithAssociatedDevices_Without_Authentication_Neg | Deactivate SBI with associated Devices without Partner authentication | 00:00:00 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_20 | Pms_DeactivateSBIWithAssociatedDevices_with_invalid_roles_Neg | Deactivate SBI with invalid Partner roles | 00:00:00 |
| ApproveMappingDeviceToSbiwhenSBIisDeactivated — Passed | |||
| TC_PMS_ApproveMappingDevice_15 | Pms_ApproveMappingDeviceToSbi_whenSBIisDeactivated_Neg | Approve Mapping Device To Sbi when SBI is Deactivated | 00:00:00 |
| GetAllApprovedFtmProvider — Passed | |||
| Pms_All_Approved_Ftm_Provider_AllValid_Smoke | Fetching all the certificate for the Partner Id | 00:00:00 | |
| GetAllApprovedFtmProviderNegativeScenarios — Passed | |||
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_03 | Pms_Get_All_Approved_Ftm_Provider_Before_Uploading_CA_Cert_Neg | Retrieve all approved FTM Providers before uploading CA certificates | 00:00:00 |
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_04 | Pms_Get_All_Approved_Ftm_Provider_Before_Uploading_Partner_Cert_Neg | Retrieve all approved FTM Providers before uploading Partner certificate | 00:00:00 |
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_02 | Pms_Get_All_Approved_Ftm_Provider_Invalid_Token_Neg | Retrieve all approved FTM Providers with Invalid access token | 00:00:00 |
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_01 | Pms_Get_All_Approved_Ftm_Provider_Without_Authentication_Neg | Retrieve all approved FTM Providers without Partner authentication | 00:00:00 |
| GetListAllFTMChipNegativeScenarios — Passed | |||
| TC_PMS_GetListAllFTMChipNegativeScenarios_02 | Pms_GetListAllFTMChip_Invalid_Token_Neg | Retrieve all FTM chip details with Invalid access token | 00:00:00 |
| TC_PMS_GetListAllFTMChipNegativeScenarios_03 | Pms_GetListAllFTMChip_WhenNo_FTM_Chips_AddedNeg | Retrieve all FTM chip details when FTM Chips are not added for Partner | 00:00:00 |
| TC_PMS_GetListAllFTMChipNegativeScenarios_01 | Pms_GetListAllFTMChip_Without_Authentication_Neg | Retrieve all FTM chip details without Partner authentication | 00:00:00 |
| CreateFtmChipDetails — Passed | |||
| TC_PMS_createFtmChipDetails_01 | Pms_CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid | Create Ftm Chip Details | 00:00:00 |
| GetOriginalFtmCertifacteNegativeScenariosBeforeUploadCert — Passed | |||
| TC_PMS_GetOriginalFtmCertifacte_01 | Pms_GetOriginalPartnerCertificates_Before_Uploading_Partner_Cert_Neg | Retrieve Original FTM Certifacte with valid Partner ID | 00:00:00 |
| DeactivateFtmwhichisPendingforCertUpload — Passed | |||
| TC_PMS_DeactivateFtm_20 | Pms_DeactivateFtm_whichisPendingforCertUpload_Neg | Deactivate FTM which is Pending for Approval | 00:00:00 |
| GetOriginalFtmCertifacteforPendingforCertUpload — Passed | |||
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_07 | Pms_GetOriginalPartnerCertificates_forPendingforCertUpload_Neg | Retrieve Original FTM Certifacte for Pending for Certificate Upload | 00:00:00 |
| UploadCertificateOfFtpChip — Passed | |||
| TC_PMS_UploadCertificateOfFtpChip_01 | Pms_UploadCertificate_AllValid_smoke_ftpProviderId | Upload FTP chip Certificate | 00:00:00 |
| DeactivateFtmwhichisPendingforApproval — Passed | |||
| TC_PMS_DeactivateFtm_19 | Pms_DeactivateFtm_whichisPendingforApproval_Neg | Deactivate FTM which is Pending for Approval | 00:00:00 |
| ApproveFTMChipDetail — Passed | |||
| TC_PMS_ApproveFTMchipDetail_01 | Pms_ApproveFTMChipDetail_allValid_smoke | Approve FTM Chip Detail | 00:00:00 |
| GetListAllFTMChip — Passed | |||
| TC_PMS_GetListAllFTMChip_01 | Pms_GetListAllFTMChip_All_Valid_Smoke | Retrieve all FTM chip details with valid details | 00:00:00 |
| GetOriginalFtmCertifacte — Failed | |||
| TC_PMS_GetOriginalFtmCertifacte_01 | Pms_GetOriginalPartnerCertificates_allValid_smoke | Retrieve Original FTM Certifacte with valid Partner ID | 00:00:00 |
| GetOriginalFtmCertifacteNegativeScenarios — Passed | |||
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_05 | Pms_GetOriginalPartnerCertificates_Invalid_FTM_ID_Neg | Retrieve Original FTM Certifacte while keeping FTM ID parameter as Invalid and expecting an error in the response | 00:00:00 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_06 | Pms_GetOriginalPartnerCertificates_Invalid_Value_FTM_ID_Neg | Retrieve Original FTM Certifacte while keeping FTM ID parameter as Invalid and expecting an error in the response | 00:00:00 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_04 | Pms_GetOriginalPartnerCertificates_SpaceVla_FTM_ID_Neg | Retrieve Original FTM Certifacte while keeping FTM ID parameter as Missing and expecting an error in the response | 00:00:00 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_02 | Pms_GetOriginalPartnerCertificates_with_Invalid_AccessToken_Neg | Retrieve Original FTM Certifacte with invalid partner access token and expecting an error in the response | 00:00:00 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_01 | Pms_GetOriginalPartnerCertificates_without_Authentication_Neg | Retrieve Original FTM Certifacte without partner Authentication and expecting an error in the response | 00:00:00 |
| DeactivateFtm — Passed | |||
| TC_PMS_DeactivateFtm_01 | Pms_DeactivateFtm_all_Valid_Smoke_sid | Deactivate Device with valid Partner authentication | 00:00:00 |
| DeactivateFtmNegativeScenarios — Passed | |||
| TC_PMS_DeactivateFtmNegativeScenarios_14 | Pms_DeactivateFtm_Already_Deactivate_FTM_Neg | Deactivating the FTM which is already Deactivated and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_16 | Pms_DeactivateFtm_Empty_FTM_ID_Neg | Deactivate the FTM while keeping FTM ID parameter as Empty and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_04 | Pms_DeactivateFtm_Empty_Req_ID_Neg | Deactivate FTM keeping ID parameter as Empty in request and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_07 | Pms_DeactivateFtm_Empty_Version_Neg | Deactivate FTM while keeping Version parameter as Empty in request and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_12 | Pms_DeactivateFtm_Empty_requestTime_Neg | Deactivate FTM while keeping requestTime parameter as Empty in request and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_17 | Pms_DeactivateFtm_Invalid_Values_FTM_ID_Neg | Deactivate the FTM while keeping FTM ID parameter as Invalid values and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_09 | Pms_DeactivateFtm_Invalid_VersionValue0_Neg | Deactivate FTM while keeping Version parameter as invalid value 0 in request and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_08 | Pms_DeactivateFtm_Invalid_VersionValue1_Neg | Deactivate FTM while keeping Version parameter as invalid value 1 in request and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_10 | Pms_DeactivateFtm_Invalid_Version_Num_Neg | Deactivate FTM while keeping Version parameter as invalid values in request and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_13 | Pms_DeactivateFtm_Invalid_requestTime_Neg | Deactivate FTM while keeping Request Time parameter as invalid in request and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_03 | Pms_DeactivateFtm_Keeping_Req_IDas_Null_Neg | Deactivate FTM while keeping requestID parameter as Null in request and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_02 | Pms_DeactivateFtm_Missing_Req_ID_Neg | Deactivate FTM with the requestID parameter missing in the request and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_05 | Pms_DeactivateFtm_Missing_Version_Neg | Deactivate FTM while keeping Version parameter as Missing in request and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_11 | Pms_DeactivateFtm_Missing_requestTime_Neg | Deactivate FTM while keeping requestTime parameter as Missing in request and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_18 | Pms_DeactivateFtm_Null_FTM_ID_Neg | Deactivate the FTM while keeping FTM ID parameter as Null and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_06 | Pms_DeactivateFtm_Null_Version_Neg | Deactivate FTM while keeping Version parameter as Null in request and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_15 | Pms_DeactivateFtm_with_SpaceValue_FTM_ID_Neg | Deactivate the FTM while keeping FTM ID parameter as Missing and expecting an error in the response | 00:00:00 |
| TC_PMS_DeactivateFtmNegativeScenarios_01 | Pms_DeactivateFtm_without_Authentication_Neg | Deactivate FTM without Partner authentication and expecting an error in the response | 00:00:00 |
| GetOriginalFtmCertifacteAfterDeactiveFtm — Passed | |||
| TC_PMS_GetOriginalFtmCertifacteAfterDeactiveFtm_01 | Pms_GetOriginalFtmCertifacte_AfterDeactiveFtm_Neg | Get Original Ftm Certifacte After Deactivate Ftm | 00:00:00 |
| GetListOfFtmChip — Passed | |||
| TC_PMS_FTM_chip_03 | Pms_GetListOfFtmChip_All_Valid_Smoke | Fetching all the ftpchipdetail | 00:00:00 |
| TC_PMS_FTM_chip_18 | Pms_GetListOfFtmChip_with_make_given | Fetching all the ftpchipdetail for make value contains 'abcd' | 00:00:00 |
| TC_PMS_FTM_chip_19 | Pms_GetListOfFtmChip_with_model_given | Fetching all the ftpchipdetail for model value contains 'xyz' | 00:00:00 |
| TC_PMS_FTM_chip_08 | Pms_GetListOfFtmChip_with_orgName_given | Fetching all the ftpchipdetail for orgName which contains '1' | 00:00:00 |
| TC_PMS_FTM_chip_17 | Pms_GetListOfFtmChip_with_pagesize_given | Fetching all the ftpchipdetail for pageSize specified | 00:00:00 |
| TC_PMS_FTM_chip_09 | Pms_GetListOfFtmChip_with_partnerId_given | Fetching all the ftpchipdetail for partnerId which contains 'a' | 00:00:00 |
| TC_PMS_FTM_chip_20 | Pms_GetListOfFtmChip_with_random_value_given | Fetching all the ftpchipdetail by giving random value for partnerId | 00:00:00 |
| TC_PMS_FTM_chip_06 | Pms_GetListOfFtmChip_with_sortType_ASC | Fetching all the ftpchipdetail by sort type ASC for the given sort field | 00:00:00 |
| TC_PMS_FTM_chip_07 | Pms_GetListOfFtmChip_with_sortType_DESC | Fetching all the ftpchipdetail by sort type DESC for the given sort field | 00:00:00 |
| TC_PMS_FTM_chip_11 | Pms_GetListOfFtmChip_with_status_given_approved | Fetching all the ftpchipdetail for status as approved | 00:00:00 |
| TC_PMS_FTM_chip_12 | Pms_GetListOfFtmChip_with_status_given_deactivated | Fetching all the ftpchipdetail for status as deactivated | 00:00:00 |
| TC_PMS_FTM_chip_14 | Pms_GetListOfFtmChip_with_status_given_pending_approval | Fetching all the ftpchipdetail for status as pending_approval | 00:00:00 |
| TC_PMS_FTM_chip_13 | Pms_GetListOfFtmChip_with_status_given_pending_cert_upload | Fetching all the ftpchipdetail for status as pending_cert_upload | 00:00:00 |
| TC_PMS_FTM_chip_10 | Pms_GetListOfFtmChip_with_status_given_rejected | Fetching all the ftpchipdetail for status as rejected | 00:00:00 |
| TC_PMS_FTM_chip_21 | Pms_GetListOfFtmChip_with_with_combination_search_twofields | Fetching all the ftpchipdetail by giving value for both make and model | 00:00:00 |
| GetListOfFtmChipNegativeScenarios — Passed | |||
| TC_PMS_FTM_chip_16 | Pms_GetListOfFtmChip_Negative_pageNo_Neg | Fetching all the ftpchipdetail with negative pageNo | 00:00:00 |
| TC_PMS_FTM_chip_15 | Pms_GetListOfFtmChip_Negative_pagesize_Neg | Fetching all the ftpchipdetail with negative pagesize | 00:00:00 |
| TC_PMS_FTM_chip_05 | Pms_GetListOfFtmChip_invalid_sortType_Neg | Fetching all the ftpchipdetail with invalid sortType | 00:00:00 |
| TC_PMS_FTM_chip_04 | Pms_GetListOfFtmChip_invalid_sortfield_Neg | Fetching all the ftpchipdetail with invalid sortfieldname | 00:00:00 |
| TC_PMS_FTM_chip_02 | Pms_GetListOfFtmChip_invalid_token_Neg | Fetching all the ftpchipdetail with invalid token | 00:00:00 |
| TC_PMS_FTM_chip_01 | Pms_GetListOfFtmChip_without_Authentication_Neg | Fetching all the ftpchipdetail without authentication | 00:00:00 |
| GetListOfAllSBINegativeScenarios — Passed | |||
| TC_PMS_SBI_List_05 | Pms_GetListOfAllSBI_invalid_sortType_Neg | Fetching all the active SBI with invalid sortType | 00:00:00 |
| TC_PMS_SBI_List_04 | Pms_GetListOfAllSBI_invalid_sortfield_Neg | Fetching all the active SBI with invalid sortfield | 00:00:00 |
| TC_PMS_SBI_List_02 | Pms_GetListOfAllSBI_invalid_token_Neg | Fetching all the active SBI with invalid token | 00:00:00 |
| TC_PMS_SBI_List_07 | Pms_GetListOfAllSBI_negative_pageNo_Neg | Fetching all the active SBI with negative pageNo value | 00:00:00 |
| TC_PMS_SBI_List_06 | Pms_GetListOfAllSBI_negative_pageSize_Neg | Fetching all the active SBI with negative pagesize value | 00:00:00 |
| TC_PMS_SBI_List_01 | Pms_GetListOfAllSBI_without_Authentication_Neg | Fetching all the active SBI without Authentication | 00:00:00 |
| GetListOfAllDevice — Passed | |||
| TC_PMS_devicedetails_01 | Pms_GetListOfAllDevice_All_Valid_Smoke | Fetching list of all the devices | 00:00:00 |
| TC_PMS_devicedetails_22 | Pms_GetListOfAllDevice_deviceId_given | Fetching list of all the devices with deviceId given as '9' | 00:00:00 |
| TC_PMS_devicedetails_24 | Pms_GetListOfAllDevice_deviceId_random_value_given | Fetching list of all the devices with random value given for deviceid | 00:00:00 |
| TC_PMS_devicedetails_18 | Pms_GetListOfAllDevice_deviceSubType_given | Fetching list of all the devices with deviceSubType given as 'i' | 00:00:00 |
| TC_PMS_devicedetails_17 | Pms_GetListOfAllDevice_deviceType_given | Fetching list of all the devices with deviceType given as 'i' | 00:00:00 |
| TC_PMS_devicedetails_16 | Pms_GetListOfAllDevice_invalid_sortfield_Neg | Fetching list of all the devices with invalid sortFieldName | 00:00:00 |
| TC_PMS_devicedetails_12 | Pms_GetListOfAllDevice_invalid_sorttype | Fetching list of all the devices with invalid sorttype | 00:00:00 |
| TC_PMS_devicedetails_03 | Pms_GetListOfAllDevice_invalid_token | Fetching list of all the devices with invalid token | 00:00:00 |
| TC_PMS_devicedetails_19 | Pms_GetListOfAllDevice_make_given | Fetching list of all the devices with make given as '3' | 00:00:00 |
| TC_PMS_devicedetails_20 | Pms_GetListOfAllDevice_model_given | Fetching list of all the devices with model given as '4' | 00:00:00 |
| TC_PMS_devicedetails_23 | Pms_GetListOfAllDevice_multiple_attribute_values_given | Fetching list of all the devices with make and model is given | 00:00:00 |
| TC_PMS_devicedetails_05 | Pms_GetListOfAllDevice_negative_pageno | Fetching list of all the devices with negative pageno | 00:00:00 |
| TC_PMS_devicedetails_06 | Pms_GetListOfAllDevice_negative_pagesize | Fetching list of all the devices with negative pageSize | 00:00:00 |
| TC_PMS_devicedetails_21 | Pms_GetListOfAllDevice_sbiId_given | Fetching list of all the devices with sbiId given as 'q' | 00:00:00 |
| TC_PMS_devicedetails_15 | Pms_GetListOfAllDevice_sbiversion_given | Fetching list of all the devices with sbiVersion given as 'abcd' | 00:00:00 |
| TC_PMS_devicedetails_13 | Pms_GetListOfAllDevice_sorttype_asc | Fetching list of all the devices with sorttype as 'asc' | 00:00:00 |
| TC_PMS_devicedetails_14 | Pms_GetListOfAllDevice_sorttype_desc | Fetching list of all the devices with sorttype as 'desc' | 00:00:00 |
| TC_PMS_devicedetails_25 | Pms_GetListOfAllDevice_with_orgName | Fetching list of all the devices with orgName value given as '1' | 00:00:00 |
| TC_PMS_devicedetails_04 | Pms_GetListOfAllDevice_with_pagesize_specified | Fetching list of all the devices with pagesize specified | 00:00:00 |
| TC_PMS_devicedetails_11 | Pms_GetListOfAllDevice_with_partnerid | Fetching list of all the devices with partnerid value given as 'a' | 00:00:00 |
| TC_PMS_devicedetails_08 | Pms_GetListOfAllDevice_with_status_approved | Fetching list of all the devices with status as approved | 00:00:00 |
| TC_PMS_devicedetails_09 | Pms_GetListOfAllDevice_with_status_deactivated | Fetching list of all the devices with status as deactivated | 00:00:00 |
| TC_PMS_devicedetails_10 | Pms_GetListOfAllDevice_with_status_pending_approval | Fetching list of all the devices with status as pending_approval | 00:00:00 |
| TC_PMS_devicedetails_07 | Pms_GetListOfAllDevice_with_status_rejected | Fetching list of all the devices with status as rejected | 00:00:00 |
| TC_PMS_devicedetails_02 | Pms_GetListOfAllDevice_without_Authentication | Fetching list of all the devices without authentication | 00:00:00 |
| GetCountOfFtm — Passed | |||
| Pms_GetCountOfFtm_All_Valid_Smoke | Fetching all active FTM | 00:00:00 | |
| GetAllSystemConfigs — Passed | |||
| TC_PMS_GetAllSystemConfigs_01 | Pms_GetAllSystemConfigs_All_Valid_Smoke | Fetching all the configuration for PMS | 00:00:00 |
| TC_PMS_GetAllSystemConfigs_02 | Pms_GetAllSystemConfigs_without_authentication_Neg | Fetching all the configuration for PMS without authentication | 00:00:00 |
| GetAllRootCertificate — Failed | |||
| Pms_GetAllRootCertificate_allValid_smoke | Fetching all the root certificates of the Logged in Partner | 00:00:00 | |
| GetListOfApiKey — Passed | |||
| TC_PMS_GetListOfApiKey_01 | Pms_GetListOfApiKey_All_Valid_Smoke | Fetching all the API Keys | 00:00:00 |
| TC_PMS_GetListOfApiKey_03 | Pms_GetListOfApiKey_with_individual_partner_Neg | Fetching the API Keys with individual partner | 00:00:00 |
| TC_PMS_GetListOfApiKey_04 | Pms_GetListOfApiKey_with_invalid_pageSize | Fetching the API Keys with pageSize | 00:00:00 |
| TC_PMS_GetListOfApiKey_11 | Pms_GetListOfApiKey_with_invalid_sortType_Neg | Fetching the API Keys with invalid sortType | 00:00:00 |
| TC_PMS_GetListOfApiKey_05 | Pms_GetListOfApiKey_with_negative_pageNo_Neg | Fetching the API Keys with negative pageNo | 00:00:00 |
| TC_PMS_GetListOfApiKey_06 | Pms_GetListOfApiKey_with_negative_pageSize_Neg | Fetching the API Keys with negative pageSize | 00:00:00 |
| TC_PMS_GetListOfApiKey_16 | Pms_GetListOfApiKey_with_partial_apiKeyLabel_value | Fetching the API Keys with partial apiKeyLabel values | 00:00:00 |
| TC_PMS_GetListOfApiKey_14 | Pms_GetListOfApiKey_with_partial_orgName_value | Fetching the API Keys with partial orgName value | 00:00:00 |
| TC_PMS_GetListOfApiKey_09 | Pms_GetListOfApiKey_with_partial_partnerId_value | Fetching the API Keys on passing partial partnerId value | 00:00:00 |
| TC_PMS_GetListOfApiKey_10 | Pms_GetListOfApiKey_with_partial_policyGroupName_value | Fetching the API Keys on passing partial policyGroupName value | 00:00:00 |
| TC_PMS_GetListOfApiKey_15 | Pms_GetListOfApiKey_with_partial_policyName_value | Fetching the API Keys with partial policyName values | 00:00:00 |
| TC_PMS_GetListOfApiKey_17 | Pms_GetListOfApiKey_with_random_data | Fetching the API Keys with random values given to a valid parameter | 00:00:00 |
| TC_PMS_GetListOfApiKey_07 | Pms_GetListOfApiKey_with_status_activated | Fetching the API Keys with status activated | 00:00:00 |
| TC_PMS_GetListOfApiKey_08 | Pms_GetListOfApiKey_with_status_deactivated | Fetching the API Keys with status deactivated | 00:00:00 |
| TC_PMS_GetListOfApiKey_12 | Pms_GetListOfApiKey_with_valid_ascending_sortType | Fetching the API Keys with ascending sortType | 00:00:00 |
| TC_PMS_GetListOfApiKey_13 | Pms_GetListOfApiKey_with_valid_descending_sortType | Fetching the API Keys with ascending sortType | 00:00:00 |
| TC_PMS_GetListOfApiKey_02 | Pms_GetListOfApiKey_without_authentication_Neg | Fetching the API Keys without authentication | 00:00:00 |
| DownloadRootCertificate — Failed | |||
| Pms_DownloadRootCertificate_allValid_smoke | Fetching all the root certificates of the Logged in Partner | 00:00:00 | |
| DeactivatePolicy — Passed | |||
| TC_PMS_deactivate_policy_01 | Pms_DeactivatePolicy_After_Publish_All_Valid_Smoke | Deactivate policy | 00:00:00 |
| TC_PMS_deactivate_policy_06 | Pms_DeactivatePolicy_already_deactivated | Deactivate policy which is already deactiavted | 00:00:00 |
| TC_PMS_deactivate_policy_04 | Pms_DeactivatePolicy_invalid_policyId | Deactivate policy with invalid policyid | 00:00:00 |
| TC_PMS_deactivate_policy_05 | Pms_DeactivatePolicy_invalid_policyId_spaces | Deactivate policy with only spaces as policyid | 00:00:00 |
| TC_PMS_deactivate_policy_03 | Pms_DeactivatePolicy_invalid_roles | Deactivate policy authenticated with invalid roles | 00:00:00 |
| TC_PMS_deactivate_policy_10 | Pms_DeactivatePolicy_with_approved_policyrequests | Deactivate policy with approved policy requests | 00:00:00 |
| TC_PMS_deactivate_policy_02 | Pms_DeactivatePolicy_without_authentication | Deactivate policy without authentication | 00:00:00 |
| TC_PMS_deactivate_policy_07 | Pms_DeactivatePolicy_without_id | Deactivate policy without id | 00:00:00 |
| TC_PMS_deactivate_policy_09 | Pms_DeactivatePolicy_without_requestime | Deactivate policy without requesttime | 00:00:00 |
| TC_PMS_deactivate_policy_08 | Pms_DeactivatePolicy_without_version | Deactivate policy without version | 00:00:00 |
| DeactivatePolicyGroup — Passed | |||
| TC_PMS_deactivate_policy_group_01 | Pms_DeactivatePolicyGroup_All_Valid_Smoke | Deactivate Policy Group | 00:00:00 |
| TC_PMS_deactivate_policy_group_12 | Pms_DeactivatePolicyGroup_future_date_neg | Deactivate Policy Group with future date given as requesttime | 00:00:00 |
| TC_PMS_deactivate_policy_group_05 | Pms_DeactivatePolicyGroup_invalid_id_neg | Deactivate Policy Group with invalid id value | 00:00:00 |
| TC_PMS_deactivate_policy_group_11 | Pms_DeactivatePolicyGroup_invalid_policygroupid_neg | Deactivate Policy Group invalid policygroupid | 00:00:00 |
| TC_PMS_deactivate_policy_group_03 | Pms_DeactivatePolicyGroup_invalid_roles_neg | Deactivate Policy Group authenticated using invalid roles | 00:00:00 |
| TC_PMS_deactivate_policy_group_09 | Pms_DeactivatePolicyGroup_invalid_status_neg | Deactivate Policy Group with invalid status | 00:00:00 |
| TC_PMS_deactivate_policy_group_07 | Pms_DeactivatePolicyGroup_invalid_version_neg | Deactivate Policy Group invalid version | 00:00:00 |
| TC_PMS_deactivate_policy_group_13 | Pms_DeactivatePolicyGroup_past_date_neg | Deactivate Policy Group with past date given as requesttime | 00:00:00 |
| TC_PMS_deactivate_policy_group_10 | Pms_DeactivatePolicyGroup_spacevalue_policygroupid_neg | Deactivate Policy Group without policygroupid | 00:00:00 |
| TC_PMS_deactivate_policy_group_17 | Pms_DeactivatePolicyGroup_with_Draftpolicy_neg | Deactivate Policy Group with draft policy | 00:00:00 |
| TC_PMS_deactivate_policy_group_15 | Pms_DeactivatePolicyGroup_with_deactivated_policies | Deactivate Policy Group with deactivated policies | 00:00:00 |
| TC_PMS_deactivate_policy_group_16 | Pms_DeactivatePolicyGroup_with_publishpolicy_neg | Deactivate Policy Group with published policy | 00:00:00 |
| TC_PMS_deactivate_policy_group_02 | Pms_DeactivatePolicyGroup_without_authentication_neg | Deactivate Policy Group without authentication | 00:00:00 |
| TC_PMS_deactivate_policy_group_04 | Pms_DeactivatePolicyGroup_without_id_neg | Deactivate Policy Group without id value | 00:00:00 |
| TC_PMS_deactivate_policy_group_14 | Pms_DeactivatePolicyGroup_without_requesttime_neg | Deactivate Policy Group without requesttime | 00:00:00 |
| TC_PMS_deactivate_policy_group_08 | Pms_DeactivatePolicyGroup_without_status_neg | Deactivate Policy Group without status | 00:00:00 |
| TC_PMS_deactivate_policy_group_06 | Pms_DeactivatePolicyGroup_without_version_neg | Deactivate Policy Group without version | 00:00:00 |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Invalid_Request_Time_Neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group192345", "name": "mosip policy group 192345", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.name" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup with invalid request time, uniqueIdentifier=TC_PMS_definePolicyGroup_03 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.partner.utils.PMSRevampUtil.isTestCaseValidForExecution(PMSRevampUtil.java:28)
at io.mosip.testrig.apirig.partner.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:89)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Missing_InputParameter_requesttime_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group 1233", "name": "mosip policy group 1233", "requesttime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.name" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a policy group with missing request time, uniqueIdentifier=TC_PMS_definePolicyGroup_06 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.partner.utils.PMSRevampUtil.isTestCaseValidForExecution(PMSRevampUtil.java:28)
at io.mosip.testrig.apirig.partner.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:89)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_DeleteBeforePolicyCreation_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip delete before policy creation policy group19234", "name": "mosip delete before policy creation policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for draft policy, uniqueIdentifier=TC_PMS_definePolicyGroup_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_ForDeactivatePolicy_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc deactivate mosip policy group19234", "name": "mosip deactivate policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for deactivate policy, uniqueIdentifier=TC_PMS_definePolicyGroup_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_ForDraftPolicy_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip draft policy group19234", "name": "mosip draft policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for draft policy, uniqueIdentifier=TC_PMS_definePolicyGroup_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc published mosip policy group19234", "name": "mosip published policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for published policy, uniqueIdentifier=TC_PMS_definePolicyGroup_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group19234", "name": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_AlreadyExists_InValid_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group19234", "name": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_014", "message": "Policy group exists with name : mosip policy group" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy neg", "name": "mosip policy group neg", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Missing_InputParameter_desc_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.desc" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy Group, uniqueIdentifier=TC_PMS_definePolicyGroup_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Missing_InputParameter_name_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group", "name": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.name" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy Group, uniqueIdentifier=TC_PMS_definePolicyGroup_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Without_Auth_neg, endPoint=/v1/policymanager/policies/group/new, role=temp, templateFields=null, input={ "desc": "desc mosip policy group192345", "name": "mosip policy group 192345", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "KER-ATH-403", "message": "Forbidden" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a policy group, uniqueIdentifier=TC_PMS_definePolicyGroup_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group1923456789", "name": "mosip policy group1923456789", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_create_then_deactivateAll_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group1923456", "name": "mosip policy group1923456", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroupBeforePolicyCreation_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_DeleteBeforePolicyCreation_pms_sid_id$" }, output= { "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_DeleteBeforePolicyCreation_pms_sid_id$", "isActive": false }, inputTemplate=pms/DeactivatePolicyGroupBeforePolicyCreation/deactivatePolicyGroup, outputTemplate=pms/DeactivatePolicyGroupBeforePolicyCreation/deactivatePolicyGroupResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group before policy is created, uniqueIdentifier=TC_PMS_DeactivatePolicyGroupBeforePolicyCreation_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Draft_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc draft mosip policy 19234", "name": "mosip draft policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip draft policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip draft policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Get_ApiKey_with_deactivated_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group 19234", "name": "mosip policy", "desc": "desc mosip policy", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/policy/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get API key for deactivated SID, uniqueIdentifier=TC_PMS_definePolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Published_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc published mosip policy 19234", "name": "mosip published policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip published policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip published policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Blank, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy for invalid AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicy_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Invalid_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "kjh54", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy For invalid AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicy_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Null_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "null", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy for auth token type null, uniqueIdentifier=TC_PMS_definePolicy_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Policy, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "Policy", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy for authtoken type policy, uniqueIdentifier=TC_PMS_definePolicy_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Space, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": " ", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy for AuthTypeToken space, uniqueIdentifier=TC_PMS_definePolicy_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc deactive mosip policy 19234", "name": "mosip deactive policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip deactivate policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip deactivate policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy 19234", "name": "mosip policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_DemoAuth_With_Same_Policy_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy 19234", "authSubType": "FINGER", "authType": "demo", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_009", "message": "$IGNORE$" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy with same policyname, uniqueIdentifier=TC_PMS_definePolicy_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_authTokenType_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy group Neg2", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$REMOVE$", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy without authtoken type, uniqueIdentifier=TC_PMS_definePolicy_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_authType_neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy group Neg", "authSubType": "FINGER", "authType": "$REMOVE$", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicyNeg, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy without authtype, uniqueIdentifier=TC_PMS_definePolicy_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_descNeg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy withput input parameter, uniqueIdentifier=TC_PMS_definePolicy_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_mandatory_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy group Neg 1", "authSubType": "FINGER", "authType": "bio", "mandatory": $REMOVE$, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "allowedKycAttributes": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicyNeg, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy, uniqueIdentifier=TC_PMS_definePolicy_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_name_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "$REMOVE$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy missing input parameter, uniqueIdentifier=TC_PMS_definePolicy_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_policyGroupName, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$REMOVE$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy without policygroupname, uniqueIdentifier=TC_PMS_definePolicy_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_policyType, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "$REMOVE$", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy without policy type, uniqueIdentifier=TC_PMS_definePolicy_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_PolicyGrpInActive_InValid_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy 192345", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip delete before policy creation policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_053" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy for Inactive policy group, uniqueIdentifier=TC_PMS_definePolicy_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_PolicyGrpNotExists_InValid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "asbgdfg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_019" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy for non existing policygroup, uniqueIdentifier=TC_PMS_definePolicy_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_RandomTokenType_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy2", "name": "mosip policy2 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": false, "attributeName": "string", "authTokenType": "random", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip policy2", "desc": "desc mosip policy2", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/policy/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Define Policy for random AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicy_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Remove_Demo_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy5", "name": "mosip policy5 Neg", "authSubType": "FINGER", "authType": "$REMOVE$", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicyNeg, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy without demo, uniqueIdentifier=TC_PMS_definePolicy_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_demo_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "demo", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group neg", "name": "mosip policy9 Neg", "desc": "desc mosip policy9", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy, uniqueIdentifier=TC_PMS_definePolicy_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_when_authTokenType_invalid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "162g@fsgs", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid authtokentype, uniqueIdentifier=TC_PMS_definePolicy_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_when_authTokenType_missing, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$REMOVE$", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy without authtoken type, uniqueIdentifier=TC_PMS_definePolicy_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_when_authTokenType_null, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy without authtoken type, uniqueIdentifier=TC_PMS_definePolicy_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_without_AuthTypeToken, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$IGNORE$", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=DefinePolicy without AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicy_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_ForNeg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_For_Get_ApiKey_with_deactivated_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Publish The Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Publish The Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_forDeactivatePolicyGroup_ForNeg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_For_Published_Policy_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Publish The Policy for deactivate policy group with published policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_ForDeactive_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_ForDeactivatePolicy_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Publish The Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_InValid_AlreadyPublished_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_020" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy which is already published, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_InValid_policyId_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "afgrwfg", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy with invalid policyid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_InValid_policygroupId_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "sgdasfgbv", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_016" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy with invalid policygroupid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_invalid_auth_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=invalidtoken, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy without access token, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllActivePolicyGroups_All_Valid_Smoke, endPoint=/v1/policymanager/policies/policy-groups, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroups, outputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroupsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active PolicyGroups, uniqueIdentifier=TC_PMS_GetAllActivePolicyGroups_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllActivePolicyGroups_Invalid_auth, endPoint=/v1/policymanager/policies/policy-groups, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroups, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active PolicyGroups with invalid token, uniqueIdentifier=TC_PMS_GetAllActivePolicyGroups_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllActivePolicyGroups_without_auth, endPoint=/v1/policymanager/policies/policy-groups, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroups, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active PolicyGroups without token, uniqueIdentifier=TC_PMS_GetAllActivePolicyGroups_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_withoutPartnerRegister_Neg, endPoint=/v1/partnermanager/partner-api-keys, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key Without Partner Register, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerId_BeforePartnerCreate_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all approved Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Invalid_Request_Time_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763123@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "11199911", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner with invalid request time, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_05 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.partner.utils.PMSRevampUtil.isTestCaseValidForExecution(PMSRevampUtil.java:28)
at io.mosip.testrig.apirig.partner.testscripts.SimplePost.test(SimplePost.java:83)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Missing_Request_Time_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763125@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "1119910", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner with missing request time, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_04 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.partner.utils.PMSRevampUtil.isTestCaseValidForExecution(PMSRevampUtil.java:28)
at io.mosip.testrig.apirig.partner.testscripts.SimplePost.test(SimplePost.java:83)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistrationFor_PartnerAdmin_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partneradmin, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763admin@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111777", "partnerType": "FTM_Provider", "policyGroup": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111777", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111999", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111999", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Device_provider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partnerdevice, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98768@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111998", "partnerType": "Device_Provider", "policyGroup": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111998", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partnerftm, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98788@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111888", "partnerType": "FTM_Provider", "policyGroup": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111888", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Missing_Email_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "organizationName": "PMS_API_ABC_ORG", "partnerId": "1119911", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_reuse_same_Email_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111999", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_011" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_withoutuploadCert_Neg, endPoint=/v1/partnermanager/partner-api-keys, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key Without Partner Register, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_AllValid_smoke, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "mosip98763@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "emailExists": true }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_Device_Provider_AllValid_smoke, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "mosip98763@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "emailExists": true }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_Ftm_Provider_AllValid_smoke, endPoint=/v1/partnermanager/partners/email/verify, role=partnerftm, templateFields=null, input={ "emailId": "mosip98788@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "emailExists": true }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_invalid_email_neg, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "gfhgytth", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_012" } ] }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_missing_email_neg, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_012" } ] }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_without_auth_neg, endPoint=/v1/partnermanager/partners/email/verify, role=invalidtoken, templateFields=null, input={ "emailId": "mosip98763@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_with_invalid_data, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-CRY-003" } ] }, inputTemplate=pms/UploadCACertificate/uploadCertificate3, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert with invalid data, uniqueIdentifier=TC_PMS_UploadCACertificate_06 |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.utils.AdminTestException: Failed at otp output validation
at io.mosip.testrig.apirig.partner.testscripts.SimplePost.test(SimplePost.java:131)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateAuthCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_UploadAgain_Neg, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-PCM-003" } ] }, inputTemplate=pms/UploadCACertificate/uploadCertificate2, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert which is already uploaded, uniqueIdentifier=TC_PMS_UploadCACertificate_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_with_blank_data, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UploadCACertificate/uploadCertificate4, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert with blank data, uniqueIdentifier=TC_PMS_UploadCACertificate_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificateDeviceProvider_with_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateDeviceCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificate_Ftm_Provider_with_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateFtmCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSubCACertificate_DeviceProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateDeviceSubCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload Sub-CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSubCACertificate_Ftm_Provider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateFtmSubCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload Sub-CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSubCACertificate_with_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateAuthSubCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload Sub-CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_BeforeCACertificates_upload_neg, endPoint=/v1/partnermanager/partners/trust-chain-certificates?pageNo=0&pageSize=8&issuedTo=PMS_API_CA&issuedBy=PMS_API_CA, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the Logged in Partner, uniqueIdentifier=TC_PMS_GetAllCertificateBeforeCACertificateUpload_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_before_certificate_upload, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerauth, templateFields=null, input={ "partnerId": "pms-111999" }, output={ "errors": [ { "errorCode": "PMS_PRT_108" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates before certificate upload, uniqueIdentifier=TC_PMS_getPartner_certificate_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert, uniqueIdentifier=TC_PMS_uploadPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_UploadAgain_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate again, uniqueIdentifier=TC_PMS_uploadPartnerCert_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_invalid_Domain_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-PCM-011" } ] }, inputTemplate=pms/UploadPartnerCert/uploadCert4, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert by giving invalid domain, uniqueIdentifier=TC_PMS_uploadPartnerCert_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_invalid_certificate_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-KMS-013" } ] }, inputTemplate=pms/UploadPartnerCert/uploadCert3, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert by giving invalid cert data, uniqueIdentifier=TC_PMS_uploadPartnerCert_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_missing_PartnerDomain_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UploadPartnerCert/uploadCert2, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert without partnerdomain, uniqueIdentifier=TC_PMS_uploadPartnerCert_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_uploadCertificateDeviceProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCertDeviceProvider, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert, uniqueIdentifier=TC_PMS_uploadPartnerCert_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_uploadCertificateFtmProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerftm, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCertFtmProvider, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert, uniqueIdentifier=TC_PMS_uploadPartnerCert_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerauth, templateFields=null, input={ "partnerId": "pms-111999" }, output= { }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_DeviceProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerdevice, templateFields=null, input={ "partnerId": "pms-111998" }, output= { }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_FtmProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerftm, templateFields=null, input={ "partnerId": "pms-111888" }, output= { }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_with_unregistered_partner_neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerauth, templateFields=null, input={ "partnerId": "848484848" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=TC_PMS_GetPartnerCert_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_Device_allValid_smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ }, output={ "partnerId": "pms-111998", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/GetAllCertificate/getAllCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the Loggedin Partner, uniqueIdentifier=TC_PMS_GetAllCertificate_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_allValid_smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerauth, templateFields=null, input={ }, output={ "partnerId": "pms-111999", "partnerType": "Auth_Partner", "isCertificateAvailable": true }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/GetAllCertificate/getAllCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the Logged in Partner, uniqueIdentifier=TC_PMS_GetAllCertificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_invalid_auth, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the partner invalid partner, uniqueIdentifier=TC_PMS_GetAllCertificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_without_auth, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the partner without login, uniqueIdentifier=TC_PMS_GetAllCertificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerId_allValid_smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=partnerauth, templateFields=null, input={ }, output={ "partnerId": "pms-111999" }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerIdResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all approved Partner Id, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerId_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerId_invalid_auth, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all approved Partner Id with invalid token, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerId_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerId_without_auth, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all approved Partner Id without token, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerId_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_BeforePolicyMapping_Neg, endPoint=/v1/partnermanager/partner-api-keys, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key Without Partner Register, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRequestedPolicies_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the Requested Policies, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_ForDeactivateOIDCNeg_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_invalid_partnerId, endPoint=/v1/partnermanager/partners/1hhggg9/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy when invalid partnerId is given, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_invalid_policyName, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "%^776hfgsdf", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy when invalid policyname is given, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_missing_policyName, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "$REMOVE$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy when policyname is removed from request, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_missing_useCaseDescription, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "useCaseDescription":"$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy when usecaseDescription is removed from request, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Invalid_Request_Time_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.partner.utils.PMSRevampUtil.isTestCaseValidForExecution(PMSRevampUtil.java:28)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Missing_Request_Time_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.partner.utils.PMSRevampUtil.isTestCaseValidForExecution(PMSRevampUtil.java:28)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_ForDeactivateOIDCNeg_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_ForDeactivateOIDCNeg_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Missing_mapping_key_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Missing_status_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRequestedPolicies_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the Requested Policies, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRequestedPolicies_invalid_auth, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the Requested Policies with invalid role, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRequestedPolicies_without_auth, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the Requested Policies without login token, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerPolicy_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy, outputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all Approved Auth Partner Policies, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerPolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerPolicy_invalid_auth, endPoint=/v1/partnermanager/partners/auth-partners-policies, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all Approved Auth Partner Policies with invalid token, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerPolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerPolicy_without_auth, endPoint=/v1/partnermanager/partners/auth-partners-policies, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all Approved Auth Partner Policies without token, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerPolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_BeforeApiKeyGenerated_Neg, endPoint=/v1/partnermanager/partner-api-keys, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key Without Partner Register, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Invalid_Request_time_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "label": "string", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_04 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.partner.utils.PMSRevampUtil.isTestCaseValidForExecution(PMSRevampUtil.java:28)
at io.mosip.testrig.apirig.partner.testscripts.SimplePatchForAutoGenId.test(SimplePatchForAutoGenId.java:84)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Missing_Request_time_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "label": "String" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_03 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.partner.utils.PMSRevampUtil.isTestCaseValidForExecution(PMSRevampUtil.java:28)
at io.mosip.testrig.apirig.partner.testscripts.SimplePatchForAutoGenId.test(SimplePatchForAutoGenId.java:84)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_AllValid_smoke_sid, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "pms-111999", "label": "string" }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/GenerateApiKey/generateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Missing_label_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 192341", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Missing_policyName_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Regenerate_Same_Key_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_110" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_activate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partnerauth, templateFields=null, input={ "partnerId": "pms-111999", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "label": "string", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ "response": "Partner apikey activated successfully." }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Activating Partner API Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_invalid_auth, endPoint=/v1/partnermanager/partner-api-keys, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner with invalid token, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_without_auth, endPoint=/v1/partnermanager/partner-api-keys, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner without token, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_invalid_auth, endPoint=/v1/partnermanager/partner-api-keys, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner with invalid token, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_without_auth, endPoint=/v1/partnermanager/partner-api-keys, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner without token, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests, uniqueIdentifier=TC_PMS_partner-policy-requests_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_With_policyId_given, endPoint=/v1/partnermanager/partner-policy-requests?policyId={policyId}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "2", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for policyId which contains '2', uniqueIdentifier=TC_PMS_partner-policy-requests_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_combination_search_twofields, endPoint=/v1/partnermanager/partner-policy-requests?partnerId={partnerId}&requestDetails={requestDetails}, role=partnerauth, templateFields=null, input={ "partnerId": "1", "requestDetails": "2", "status": "$REMOVE$", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving value for partnerId and requestDetails, uniqueIdentifier=TC_PMS_partner-policy-requests_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_orgname_given, endPoint=/v1/partnermanager/partner-policy-requests?orgName={orgName}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "1", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for orgName which contains '1', uniqueIdentifier=TC_PMS_partner-policy-requests_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_pageNo_given, endPoint=/v1/partnermanager/partner-policy-requests?pageNo={pageNo}&pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "pageNo": "8", "status": "$REMOVE$", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageSize": "5", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving valid page number given, uniqueIdentifier=TC_PMS_partner-policy-requests_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_partnerId_given, endPoint=/v1/partnermanager/partner-policy-requests?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "partnerId": "a", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for PartnerId which contains 'a', uniqueIdentifier=TC_PMS_partner-policy-requests_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_partnerType_given, endPoint=/v1/partnermanager/partner-policy-requests?partnerType={partnerType}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "a" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for partnerType which contains 'a', uniqueIdentifier=TC_PMS_partner-policy-requests_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_policygroupname_given, endPoint=/v1/partnermanager/partner-policy-requests?policyGroupName={policyGroupName}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "Group", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for policyGroupName which contains 'Group', uniqueIdentifier=TC_PMS_partner-policy-requests_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_policyname_given, endPoint=/v1/partnermanager/partner-policy-requests?policyName={policyName}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "policy", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for policyName which contains 'policy', uniqueIdentifier=TC_PMS_partner-policy-requests_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_random_value_given, endPoint=/v1/partnermanager/partner-policy-requests?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "status": "$REMOVE$", "partnerId": "&&&abcdf", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving random value for partnerid, uniqueIdentifier=TC_PMS_partner-policy-requests_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_requestDetails_given, endPoint=/v1/partnermanager/partner-policy-requests?requestDetails={requestDetails}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "ab", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for requestDetails which contains 'ab', uniqueIdentifier=TC_PMS_partner-policy-requests_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_sortType_ASC, endPoint=/v1/partnermanager/partner-policy-requests?sortType={sortType}, role=partnerauth, templateFields=null, input={ "sortType": "ASC", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by sort type ASC for the given sort field, uniqueIdentifier=TC_PMS_partner-policy-requests_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_sortType_DESC, endPoint=/v1/partnermanager/partner-policy-requests?sortType={sortType}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "DESC", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by sort type DESC for the given sort field, uniqueIdentifier=TC_PMS_partner-policy-requests_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_status_Inprogress, endPoint=/v1/partnermanager/partner-policy-requests?status={status}, role=partnerauth, templateFields=null, input={ "status": "InProgress", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for which status as Inprogress, uniqueIdentifier=TC_PMS_partner-policy-requests_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_status_approved, endPoint=/v1/partnermanager/partner-policy-requests?status={status}, role=partnerauth, templateFields=null, input={ "status": "approved", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for which status as approved, uniqueIdentifier=TC_PMS_partner-policy-requests_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_status_rejected, endPoint=/v1/partnermanager/partner-policy-requests?status={status}, role=partnerauth, templateFields=null, input={ "status": "rejected", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for which status as rejected, uniqueIdentifier=TC_PMS_partner-policy-requests_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_Invalid_Token_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests with invalid token, uniqueIdentifier=TC_PMS_partner-policy-requests_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_pageNo_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "pageNo": "-9", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving negative pageNo value, uniqueIdentifier=TC_PMS_partner-policy-requests_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_pageSize_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "pageSize": "-9", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving negative pagesize value, uniqueIdentifier=TC_PMS_partner-policy-requests_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "sortFieldName": "$%^%^&&^", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests with invalid sortfieldname, uniqueIdentifier=TC_PMS_partner-policy-requests_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_sortType_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "sortType": "hdjfdfhg", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by invalid sort type, uniqueIdentifier=TC_PMS_partner-policy-requests_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_without_Authentication_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests without authentication, uniqueIdentifier=TC_PMS_partner-policy-requests_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_All_Valid_Smoke, endPoint=/v1/partnermanager/admin-partners, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partnered in the system, uniqueIdentifier=TC_PMS_GetListOfPartners_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_All_Valid_Smoke_admin_dashboard, endPoint=/v1/partnermanager/admin-partners, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partnered in the system, uniqueIdentifier=TC_PMS_GetListOfPartners_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_Invalid_token_Neg, endPoint=/v1/partnermanager/admin-partners, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_empty_pageno_Neg, endPoint=/v1/partnermanager/admin-partners?pageNo=111111, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_empty_partnerid_Neg, endPoint=/v1/partnermanager/admin-partners?partnerId=bcbcb, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_empty_partnertype_Neg, endPoint=/v1/partnermanager/admin-partners?partnerType=dfdgd, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_pageno_Neg, endPoint=/v1/partnermanager/admin-partners?pageNo=22, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_pagesize_Neg, endPoint=/v1/partnermanager/admin-partners?pageSize=-12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_partnerid_Neg, endPoint=/v1/partnermanager/admin-partners?partnerId=-dndn333, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_partnertype_Neg, endPoint=/v1/partnermanager/admin-partners?partnerType=2233ddd, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_sortfield_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=a2a33, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_sorttype_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=a2a33, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_deactivated_partner_Neg, endPoint=/v1/partnermanager/admin-partners?isActive=false, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_empty_emailAddress_Neg, endPoint=/v1/partnermanager/admin-partners?emailAddress=454646, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_empty_organization_name_Neg, endPoint=/v1/partnermanager/admin-partners?orgName=123@1sse, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_empty_policyGroup_Name_Neg, endPoint=/v1/partnermanager/admin-partners?policyGroupName=, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_empty_sort_Neg, endPoint=/v1/partnermanager/admin-partners?sortType=&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_invalid_email_Neg, endPoint=/v1/partnermanager/admin-partners?emailAddress=2t63t@@@, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_invalid_organization_name_Neg, endPoint=/v1/partnermanager/admin-partners?orgName=123@1sse, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_invalid_policyGroup_Name_Neg, endPoint=/v1/partnermanager/admin-partners?policyGroupName=@374b, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_invalid_sort_Neg, endPoint=/v1/partnermanager/admin-partners?sortType=3@@#&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_not_uploaded_email_Neg, endPoint=/v1/partnermanager/admin-partners?certificateUploadStatus=not_uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_without_admin_role_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=idrepo, templateFields=null, input={ "partnerId": " " }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.utils.AdminTestException: Failed at output validation
at io.mosip.testrig.apirig.partner.testscripts.GetWithParam.test(GetWithParam.java:121)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111777" }, output= { }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_invalid_token_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=invalidtoken, templateFields=null, input={ "partnerId": "111777" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_with_admin_role_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partnerauth, templateFields=null, input={ "partnerId": "111777" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_with_invalid_partner_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "@334ds356" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_with_unauthor_token_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=resident, templateFields=null, input={ "partnerId": " " }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_with_unauthorized_token_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=resident, templateFields=null, input={ "partnerId": " " }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_All_Valid_Smoke, endPoint=/v1/policymanager/policies/v2, role=partneradmin, templateFields=null, input={ }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies in the system, uniqueIdentifier=TC_PMS_listofPolicies_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_invalid_token_neg, endPoint=/v1/policymanager/policies/v2, role=POLICYMANAGER, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies invalid token, uniqueIdentifier=TC_PMS_listofPolicies_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_combination_twoattributes_valid, endPoint=/v1/policymanager/policies/v2?policyId={policyId}&policyName={policyName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "1", "policyName": "1", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyName and policyid given, uniqueIdentifier=TC_PMS_listofPolicies_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_negative_pageNo_neg, endPoint=/v1/policymanager/policies/v2?pageNo={pageNo}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "-6", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with pageNo as '-6', uniqueIdentifier=TC_PMS_listofPolicies_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_negative_pageSize_neg, endPoint=/v1/policymanager/policies/v2?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "-6", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with pageSize as '-6', uniqueIdentifier=TC_PMS_listofPolicies_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_pageNo_specified_valid, endPoint=/v1/policymanager/policies/v2?pageNo={pageNo}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "6", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with pageNo as '6', uniqueIdentifier=TC_PMS_listofPolicies_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_pagesize_specified_valid, endPoint=/v1/policymanager/policies/v2?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "6", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with pageSize as '6', uniqueIdentifier=TC_PMS_listofPolicies_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyDescription_random_invalid_neg, endPoint=/v1/policymanager/policies/v2?policyDescription={policyDescription}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "3fdfds", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "0" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyDescription as '3fdfds', uniqueIdentifier=TC_PMS_listofPolicies_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyDescription_valid, endPoint=/v1/policymanager/policies/v2?policyDescription={policyDescription}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "a", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyDescription as 'a', uniqueIdentifier=TC_PMS_listofPolicies_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyGroupName_valid, endPoint=/v1/policymanager/policies/v2?policyGroupName={policyGroupName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "ab", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyGroupName as 'ab', uniqueIdentifier=TC_PMS_listofPolicies_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyId_valid, endPoint=/v1/policymanager/policies/v2?policyId={policyId}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "1", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyId as '1', uniqueIdentifier=TC_PMS_listofPolicies_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyName_valid, endPoint=/v1/policymanager/policies/v2?policyName={policyName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "a", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyName as 'a', uniqueIdentifier=TC_PMS_listofPolicies_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortFieldName_invalid_neg, endPoint=/v1/policymanager/policies/v2?sortFieldName={sortFieldName}&sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "hfghfgdhf", "sortType": "asc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortFieldName as 'status' as per given sorttype, uniqueIdentifier=TC_PMS_listofPolicies_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortFieldName_valid, endPoint=/v1/policymanager/policies/v2?sortFieldName={sortFieldName}&sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "status", "sortType": "asc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortFieldName as 'status' as per given sorttype, uniqueIdentifier=TC_PMS_listofPolicies_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortType_asc, endPoint=/v1/policymanager/policies/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "asc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortType as 'asc', uniqueIdentifier=TC_PMS_listofPolicies_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortType_desc, endPoint=/v1/policymanager/policies/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "desc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortType as 'desc', uniqueIdentifier=TC_PMS_listofPolicies_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortType_invalid_neg, endPoint=/v1/policymanager/policies/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "abdcfegff", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortType as 'abdcfegff', uniqueIdentifier=TC_PMS_listofPolicies_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_status_activated, endPoint=/v1/policymanager/policies/v2?status={status}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "activated" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with status as 'activated', uniqueIdentifier=TC_PMS_listofPolicies_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_status_deactivated, endPoint=/v1/policymanager/policies/v2?status={status}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "deactivated" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with status as 'deactivated', uniqueIdentifier=TC_PMS_listofPolicies_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_status_draft, endPoint=/v1/policymanager/policies/v2?status={status}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "draft" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with status as 'draft', uniqueIdentifier=TC_PMS_listofPolicies_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_without_Authentication_neg, endPoint=/v1/policymanager/policies/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies without authentication, uniqueIdentifier=TC_PMS_listofPolicies_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfPoliciesRequest/getListOfPoliciesRequest, outputTemplate=pms/GetListOfPoliciesRequest/getListOfPoliciesRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies Request in the system, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/GetAllOidcClient/getAllOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_ForNeg_all_Valid_sid, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_For_Get_ApiKey_with_deactivated_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/OIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client, uniqueIdentifier=null |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.utils.AdminTestException: Response has errors
at io.mosip.testrig.apirig.utils.OutputValidationUtil.doJsonOutputValidation(OutputValidationUtil.java:463)
at io.mosip.testrig.apirig.utils.OutputValidationUtil.doJsonOutputValidation(OutputValidationUtil.java:452)
at io.mosip.testrig.apirig.partner.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:124)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/OIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client, uniqueIdentifier=null |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.utils.AdminTestException: Response has errors
at io.mosip.testrig.apirig.utils.OutputValidationUtil.doJsonOutputValidation(OutputValidationUtil.java:463)
at io.mosip.testrig.apirig.utils.OutputValidationUtil.doJsonOutputValidation(OutputValidationUtil.java:452)
at io.mosip.testrig.apirig.partner.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:124)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_RedirectUri_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$abcdefg", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid redirectUri, uniqueIdentifier=null |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.utils.AdminTestException: Failed at output validation
at io.mosip.testrig.apirig.partner.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:130)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_granttypes_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "hghghgg", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid granttypes, uniqueIdentifier=null |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.utils.AdminTestException: Failed at output validation
at io.mosip.testrig.apirig.partner.testscripts.SimplePostForAutoGenId.test(SimplePostForAutoGenId.java:130)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_auth_neg, endPoint=/v1/partnermanager/oauth/client, role=invalidtoken, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client without token, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_logoUri_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https//", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid logoUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_policyID_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89767", "policyId": "fgdggh", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid policyid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_publickey_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": {}, "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid publickkey, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_without_granttypes_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "$REMOVE$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client without granttypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_without_name_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "$REMOVE$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client without name field, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_without_publickey_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$REMOVE$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client without publickkey, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOauthClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOauthClient/getAllOauthClient, outputTemplate=pms/GetAllOauthClient/getAllOauthClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "ACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClient/oIDCClientUpdate, outputTemplate=pms/OIDCClient/oIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Output Validation Exception |
org.testng.SkipException: Marking testcase as skipped as required field is empty $ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$ please check the results of testcase: CreateOIDCClient_all_Valid_Smoke_sid
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceKeywordWithValue(AdminTestUtil.java:2977)
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceIdWithAutogeneratedId(AdminTestUtil.java:3659)
at io.mosip.testrig.apirig.utils.AdminTestUtil.inputJsonKeyWordHandeler(AdminTestUtil.java:3047)
at io.mosip.testrig.apirig.utils.AdminTestUtil.putWithPathParamsBodyAndCookie(AdminTestUtil.java:1758)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:115)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/GetAllOidcClient/getAllOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_Invalid_Auth, endPoint=/v1/partnermanager/oauth/client, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_without_Auth, endPoint=/v1/partnermanager/oauth/client, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_Requesttime_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_ForNeg_all_Valid_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_03 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.partner.utils.PMSRevampUtil.isTestCaseValidForExecution(PMSRevampUtil.java:28)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_clientAuthMethods_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_ForNeg_all_Valid_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}] }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_11 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.partner.utils.PMSRevampUtil.isTestCaseValidForExecution(PMSRevampUtil.java:28)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_grantTypes_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_ForNeg_all_Valid_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_09 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.partner.utils.PMSRevampUtil.isTestCaseValidForExecution(PMSRevampUtil.java:28)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:85)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_clientNameLangMap_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_10 |
| Output Validation Exception |
org.testng.SkipException: Marking testcase as skipped as required field is empty $ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$ please check the results of testcase: CreateOIDCClient_all_Valid_Smoke_sid
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceKeywordWithValue(AdminTestUtil.java:2977)
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceIdWithAutogeneratedId(AdminTestUtil.java:3659)
at io.mosip.testrig.apirig.utils.AdminTestUtil.inputJsonKeyWordHandeler(AdminTestUtil.java:3047)
at io.mosip.testrig.apirig.utils.AdminTestUtil.putWithPathParamsBodyAndCookie(AdminTestUtil.java:1758)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:115)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_clientName_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_05 |
| Output Validation Exception |
org.testng.SkipException: Marking testcase as skipped as required field is empty $ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$ please check the results of testcase: CreateOIDCClient_all_Valid_Smoke_sid
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceKeywordWithValue(AdminTestUtil.java:2977)
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceIdWithAutogeneratedId(AdminTestUtil.java:3659)
at io.mosip.testrig.apirig.utils.AdminTestUtil.inputJsonKeyWordHandeler(AdminTestUtil.java:3047)
at io.mosip.testrig.apirig.utils.AdminTestUtil.putWithPathParamsBodyAndCookie(AdminTestUtil.java:1758)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:115)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_logoUri_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_07 |
| Output Validation Exception |
org.testng.SkipException: Marking testcase as skipped as required field is empty $ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$ please check the results of testcase: CreateOIDCClient_all_Valid_Smoke_sid
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceKeywordWithValue(AdminTestUtil.java:2977)
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceIdWithAutogeneratedId(AdminTestUtil.java:3659)
at io.mosip.testrig.apirig.utils.AdminTestUtil.inputJsonKeyWordHandeler(AdminTestUtil.java:3047)
at io.mosip.testrig.apirig.utils.AdminTestUtil.putWithPathParamsBodyAndCookie(AdminTestUtil.java:1758)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:115)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_redirectUris_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_08 |
| Output Validation Exception |
org.testng.SkipException: Marking testcase as skipped as required field is empty $ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$ please check the results of testcase: CreateOIDCClient_all_Valid_Smoke_sid
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceKeywordWithValue(AdminTestUtil.java:2977)
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceIdWithAutogeneratedId(AdminTestUtil.java:3659)
at io.mosip.testrig.apirig.utils.AdminTestUtil.inputJsonKeyWordHandeler(AdminTestUtil.java:3047)
at io.mosip.testrig.apirig.utils.AdminTestUtil.putWithPathParamsBodyAndCookie(AdminTestUtil.java:1758)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:115)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_status_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_06 |
| Output Validation Exception |
org.testng.SkipException: Marking testcase as skipped as required field is empty $ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$ please check the results of testcase: CreateOIDCClient_all_Valid_Smoke_sid
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceKeywordWithValue(AdminTestUtil.java:2977)
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceIdWithAutogeneratedId(AdminTestUtil.java:3659)
at io.mosip.testrig.apirig.utils.AdminTestUtil.inputJsonKeyWordHandeler(AdminTestUtil.java:3047)
at io.mosip.testrig.apirig.utils.AdminTestUtil.putWithPathParamsBodyAndCookie(AdminTestUtil.java:1758)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:115)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Retry_with_Deactivated_ClientId_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_ESI_008" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_02 |
| Output Validation Exception |
org.testng.SkipException: Marking testcase as skipped as required field is empty $ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$ please check the results of testcase: CreateOIDCClient_all_Valid_Smoke_sid
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceKeywordWithValue(AdminTestUtil.java:2977)
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceIdWithAutogeneratedId(AdminTestUtil.java:3659)
at io.mosip.testrig.apirig.utils.AdminTestUtil.inputJsonKeyWordHandeler(AdminTestUtil.java:3047)
at io.mosip.testrig.apirig.utils.AdminTestUtil.putWithPathParamsBodyAndCookie(AdminTestUtil.java:1758)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:115)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "INACTIVE" }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_01 |
| Output Validation Exception |
org.testng.SkipException: Marking testcase as skipped as required field is empty $ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$ please check the results of testcase: CreateOIDCClient_all_Valid_Smoke_sid
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceKeywordWithValue(AdminTestUtil.java:2977)
at io.mosip.testrig.apirig.utils.AdminTestUtil.replaceIdWithAutogeneratedId(AdminTestUtil.java:3659)
at io.mosip.testrig.apirig.utils.AdminTestUtil.inputJsonKeyWordHandeler(AdminTestUtil.java:3047)
at io.mosip.testrig.apirig.utils.AdminTestUtil.putWithPathParamsBodyAndCookie(AdminTestUtil.java:1758)
at io.mosip.testrig.apirig.partner.testscripts.PutWithPathParamsAndBody.test(PutWithPathParamsAndBody.java:115)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_client_id_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "client_id": " ", "requesttime": "$TIMESTAMP$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_ESI_004" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/GetAllOidcClient/getAllOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_GetConfiguration_allValid_smoke, endPoint=/v1/partnermanager/system-config, role=partner, templateFields=null, input={ }, output={ "grantTypes": "authorization_code", "axiosTimeout": "3", "inActivityTimer": "25", "inActivityPromptTimer": "5", "clientAuthMethods": "private_key_jwt" }, inputTemplate=pms/GetConfiguration/GetConfiguration, outputTemplate=pms/GetConfiguration/GetConfigurationResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_before_consent_given, endPoint=/v1/partnermanager/users/user-consent, role=partnerauth, templateFields=null, input={ }, output={ "userId": "pms-111999" }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/GetUserConsent/GetUserConsentResultBeforeConsent, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetUserConsent before consent is saved, uniqueIdentifier=TC_pms_GetUserConsent_05 |
| Output Validation Exception |
org.testng.SkipException: known issue. Hence skipping the testcase
at io.mosip.testrig.apirig.partner.utils.PMSRevampUtil.isTestCaseValidForExecution(PMSRevampUtil.java:28)
at io.mosip.testrig.apirig.partner.testscripts.GetWithParam.test(GetWithParam.java:83)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_saveUserConsent_AllValid_Smoke, endPoint=/v1/partnermanager/users/user-consent, role=partnerauth, templateFields=null, input={ }, output={ "userId": "pms-111999" }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/SaveUserConsent/SaveUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=save User Consent, uniqueIdentifier=TC_PMS_saveUserConsent_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_saveUserConsent_invalid_roles_Neg, endPoint=/v1/partnermanager/users/user-consent, role=ftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=save User Consent when authentication is done with invalid roles, uniqueIdentifier=TC_PMS_saveUserConsent_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_saveUserConsent_invalid_user_Neg, endPoint=/v1/partnermanager/users/user-consent, role=regproc, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=save User Consent for invalid user, uniqueIdentifier=TC_PMS_saveUserConsent_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_saveUserConsent_without_authentication_Neg, endPoint=/v1/partnermanager/users/user-consent, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=save User Consent without authentication, uniqueIdentifier=TC_PMS_saveUserConsent_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_Get_consent_status_invalid_auth_token_neg, endPoint=/v1/partnermanager/users/user-consent, role=ftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve PMS GetUserConsent Status with an Invalid Auth Token, uniqueIdentifier=TC_pms_GetUserConsent_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_Get_consent_status_invalid_user_neg, endPoint=/v1/partnermanager/users/user-consent, role=regproc, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetUserConsent Status for invalid User and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetUserConsent_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_Get_consent_status_without_access_token_neg, endPoint=/v1/partnermanager/users/user-consent, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetUserConsent Status Without an Access Token and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetUserConsent_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_allValid_smoke, endPoint=/v1/partnermanager/users/user-consent, role=partnerauth, templateFields=null, input={ }, output={ "userId": "pms-111999" }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/GetUserConsent/GetUserConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetUserConsent for All Valid Smoke, uniqueIdentifier=TC_pms_GetUserConsent_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_DeviceProvider_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerftm, templateFields=null, input={ "partnerId": "pms-111888" }, output={ }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get original ftm partner certificates, uniqueIdentifier=TC_PMS_getPartner_certificate_03 |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.utils.AdminTestException: Failed at output validation
at io.mosip.testrig.apirig.partner.testscripts.GetWithParam.test(GetWithParam.java:121)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerauth, templateFields=null, input={ "partnerId": "pms-111999" }, output={ }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates, uniqueIdentifier=TC_PMS_getPartner_certificate_01 |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.utils.AdminTestException: Failed at output validation
at io.mosip.testrig.apirig.partner.testscripts.GetWithParam.test(GetWithParam.java:121)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_invalid_roles_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerdevice, templateFields=null, input={ "partnerId": "pms-111999" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_007" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates when authenticated as device partner, uniqueIdentifier=TC_PMS_getPartner_certificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_random_partnerid_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partneradmin, templateFields=null, input={ "partnerId": "xyz12345abcdef" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates random value for partnerid, uniqueIdentifier=TC_PMS_getPartner_certificate_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_without_authentication_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111999" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates without authentication, uniqueIdentifier=TC_PMS_getPartner_certificate_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_without_partnerid_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partneradmin, templateFields=null, input={ "partnerId": "" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates without partnerid, uniqueIdentifier=TC_PMS_getPartner_certificate_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_allValid_smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=partnerdevice, templateFields=null, input={ }, output={ "partnerId": "pms-111998" }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIdsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Approved Device ProviderId, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviders_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Approved Device ProviderIds with invalid access token, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_Without_Authentication_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Approved Device ProviderIds Without Authentication, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_with_Admin_roles_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=device, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Device ProviderIds with Admin roles, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_without_partner_roles_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=device, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Approved Device ProviderIds without_partner_roles, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ "swBinaryHash": "devicehaadsassh", "swVersion": "deviceswasdasd", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_022" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI which is pending for approval, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateSecureBiometricInterface_DeviceProvider_AllValid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "approvalStatus": "Activate" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/GetSbiDetailsList/GetAllSbiDetailsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetSbiDetails List for All Valid Inputs, uniqueIdentifier=TC_pms_GetSbiDetailsList_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_partners_sbi_detail_API_with_Admin_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=regproc, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner SBI Details with Admin Role and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_response_without_Partner_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=ftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Response Without Partner Role and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_response_without_authorization_token_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve responce without authorization taken and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceTypeFilter_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partnerdevice, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "unique", "text": "" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "name", "fieldValue": "Face", "fieldCode": "Face" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Device Type Filter, uniqueIdentifier=TC_PMS_DeviceTypeFilter_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partnerdevice, templateFields=null, input={ "filters": [{ "columnName": "deviceType", "type": "unique", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "deviceType", "fieldValue": "Finger", "fieldCode": "Single" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Device SubType Filter, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998", "make": "AcmeCorpReject", "model": "X1000Reject", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Save Device Details, uniqueIdentifier=TC_PMS_SaveDeviceDetails_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998", "make": "AcmeCorp", "model": "X1000", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Save Device Details, uniqueIdentifier=TC_PMS_SaveDeviceDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI, uniqueIdentifier=TC_PMS_SBI_List_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_orgName_valid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "orgName": "1", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "policyId": "$REMOVE$ }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with orgName contains '1', uniqueIdentifier=TC_PMS_SBI_List_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_pagesize_given_valid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "pageSize": "12", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$ }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with pageSize specified, uniqueIdentifier=TC_PMS_SBI_List_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_partnerId_valid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "partnerId": "a", "orgName": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "policyId": "$REMOVE$ }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with partnerId contains 'a', uniqueIdentifier=TC_PMS_SBI_List_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_random_value_given, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "partnerId": "^&&%%%", "orgName": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "policyId": "$REMOVE$ }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with random value for partnerId, uniqueIdentifier=TC_PMS_SBI_List_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sbiExpiryStatus_expired, endPoint=/v1/partnermanager/securebiometricinterface?sbiExpiryStatus={sbiExpiryStatus}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "expired", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with sbiExpiryStatus as expired, uniqueIdentifier=TC_PMS_SBI_List_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sbiExpiryStatus_valid, endPoint=/v1/partnermanager/securebiometricinterface?sbiExpiryStatus={sbiExpiryStatus}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "valid", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with sbiExpiryStatus as vaild, uniqueIdentifier=TC_PMS_SBI_List_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sbiVersion_given, endPoint=/v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "abcd", "orgName": "$REMOVE$", "policyId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with sbiVersion, uniqueIdentifier=TC_PMS_SBI_List_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sortType_ASC, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}&sortFieldName={sortFieldName}&pageNo={pageNo}&pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "status", "sortType": "ASC", "pageNo": "0", "pageSize": "5", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with ASC, uniqueIdentifier=TC_PMS_SBI_List_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sortType_DESC, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}&sortFieldName={sortFieldName}&pageNo={pageNo}&pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "status", "sortType": "DESC", "pageNo": "0", "pageSize": "5", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with sbiVersion, uniqueIdentifier=TC_PMS_SBI_List_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_status_approved, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "approved", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with status as approved, uniqueIdentifier=TC_PMS_SBI_List_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_status_deactivated, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "deactivated", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with status as deactivated, uniqueIdentifier=TC_PMS_SBI_List_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_status_pending_approval, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_approval", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with status as pending_approval, uniqueIdentifier=TC_PMS_SBI_List_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_status_rejected, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "rejected", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with status as rejected, uniqueIdentifier=TC_PMS_SBI_List_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output= { }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Approve Mapping Device To Sbi, uniqueIdentifier=TC_PMS_ApproveMappingDevice_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_different_deviceDetails_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "34242" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi with different deviceDetails, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_which_is_already_approved_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi by providing parameters which are already approved, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_Invalid_DeviceID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$7372882$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi by providing invalid Device ID, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_Invalid_Partner_Authentication_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi with Invalid Partner Authentication, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_Invalid_SBIID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "84838772", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi by providing invalid SBI ID, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_missing_SBIID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$REMOVE$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_024" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi while keeping SBI ID parameter as missing, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_random_DeviceProviderID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "deivce-sunny", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi with randome Device provider Id, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_Partner_Authentication_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without Partner Authentication, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_Req_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without Request ID, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$REMOVE$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without requestTime, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without without sbiId value, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_Version_value_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without Version value, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_deviceProviderID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without Device provider Id, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output= { }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbi, outputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Reject Mapping Device To Sbi, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbi_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_whichisRejected_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi by providing SBI which is Rejected and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbi_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSb_ReqID_Null_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "null", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping ReqID parameter as Null in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": " " }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping device ID as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_Partner_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Empty Partner ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_RequestTimeString_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": " ", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping RequestTime parameter as Empty string in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping RequestTime parameter as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Empty SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": " ", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "7281818", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Invalid SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_VersionValue0_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as invalid value 0 in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_VersionValue1_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as invalid value 1 in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_VersionValues_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "7288283", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as invalid values in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Missing_Req_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while passing Invalid RequestID parameter in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Missing_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as Missing in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Null_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "null", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as Null in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Provide_different_SBIID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:GetListOfAllSBI_All_Valid_Smoke_sid_sbiId$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi with different SBI ID and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_ReqID_Empty_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping ReqID parameter as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_ReqID_Invalid_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "7472828", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping ReqID parameter as Invalid in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_already_Rejected_mapped_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while providing already rejeceted device ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_different_format_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "1111-07-22T08:21:17.665Z", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping RequestTime value other than given format in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "812293" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while providing invalid device ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_Device_IDvalues_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "8228828" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping device ID values in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_Partner_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "100223111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping invalid Partner ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_object_paramter_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "jadhav", "sbiId": "9329", "deviceDetailId": "93130" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi with invalid object paramter in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_null_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "null" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping device ID as null in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_null_Partner_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "null", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping null Partner ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_null_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "null", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping null SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_random_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "731811993", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping random SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_with_Partner_Roles_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=device, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi with Parter roles and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_with_different_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "233313" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi with different device ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_without_Partner_Auth_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.reject.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi without Partner Authentication and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_without_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$REMOVE$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi without RequestTime parameter in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_without_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping without SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_whichisRejected_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve Mapping Device To Sbi when SBI is Rejected, uniqueIdentifier=TC_PMS_ApproveMappingDevice_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output= { "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998" }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbiResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Get All Device List Mapped With Sbi, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedwithSbi_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_Invalid_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "sbiId": "AJDJD9281" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve all Device list which are mapped with SBI by provinding invalid SBI id in request, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_when_SBI_not_authenticated_device_provider_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "sbiId": "$ID:GetListOfAllSBI_All_Valid_Smoke_sid_sbiId$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_019" } ] }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve all Device list when SBI given is different from the authentiacted device provider, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_without_authentication_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=invalidtoken, templateFields=null, input={ "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve all Device list which are mapped with SBI without Authentication, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$", "status": "De-Activate" }, output={ }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/DeactivateDevice/DeactivateDeviceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Device, uniqueIdentifier=TC_PMS_DeactivateDevice_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_Already_deactivated_device_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_014" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Device which has been already Deactivated, uniqueIdentifier=TC_PMS_DeactivateDevice_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_Empty_requestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$REMOVE$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Device while keeping requestTime paramter as Empty, uniqueIdentifier=TC_PMS_DeactivateDevice_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_Missing_requestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Device while keeping requestTime paramter as Missing, uniqueIdentifier=TC_PMS_DeactivateDevice_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Empty_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.device.patch", "version": "$REMOVE$", "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDeviceNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Device while keeping Version parameter as Empty, uniqueIdentifier=TC_PMS_DeactivateDevice_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Invalid_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "APPLE1111222" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Device by passing invalid Device ID, uniqueIdentifier=TC_PMS_DeactivateDevice_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Invalid_RandomDevice_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "00001111222" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Device by passwing invalid Random Device ID, uniqueIdentifier=TC_PMS_DeactivateDevice_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Invalid_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.device.patch", "version": "99", "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDeviceNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Device by passing invalid Version, uniqueIdentifier=TC_PMS_DeactivateDevice_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Invalid_requestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "1111-07-22T08:21:17.665Z", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Device by passing invalid requestTime, uniqueIdentifier=TC_PMS_DeactivateDevice_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_without_authentication_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=invalidtoken, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Device without Partner authentication, uniqueIdentifier=TC_PMS_DeactivateDevice_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI along with Associated Devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Already_deactivated_SBI_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_020" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI which already Deactivated in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping ID parameter as Empty in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping SBI ID parameter as Empty in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_Version_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as Empty in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_requestTime_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping requestTime parameter as Empty in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_InvalidNumeric_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "0101022" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping SBI ID parameter as Invalid Numeric values in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "JSKSKA56888", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI by passing Invalid ID parameter in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "APPLEMANCAP" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping SBI ID parameter as Invalid values in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue0_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as invalid value 0 in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue1_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as invalid value 1 in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "9977", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as invalid values in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_requestTime_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "1111-07-22T08:21:17.665Z", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Request Time parameter as invalid in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Keeping_IDas_Null_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "Null", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping ID parameter as Null in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Missing_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping ID parameter as Missing in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Missing_Version_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "$REMOVE$", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI without Version parameter in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Missing_requestTime_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$REMOVE$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping requestTime parameter as Missing in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Null_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "Null" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping SBI ID parameter as Null in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Null_Version_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "Null", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as Null in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Without_Authentication_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=invalidtoken, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI with associated Devices without Partner authentication, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_with_invalid_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=device, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI with invalid Partner roles, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_whenSBIisDeactivated_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_029" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve Mapping Device To Sbi when SBI is Deactivated, uniqueIdentifier=TC_PMS_ApproveMappingDevice_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_All_Approved_Ftm_Provider_AllValid_Smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=FTM_Provider, role=partnerftm, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProvider, outputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProviderResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Before_Uploading_CA_Cert_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProviderBeforeUploadingCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve all approved FTM Providers before uploading CA certificates, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Before_Uploading_Partner_Cert_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProviderBeforeUploadingCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve all approved FTM Providers before uploading Partner certificate, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProvider, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve all approved FTM Providers with Invalid access token, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Without_Authentication_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProvider, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve all approved FTM Providers without Partner authentication, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListAllFTMChip_Invalid_Token_Neg, endPoint=/v1/partnermanager/ftpchipdetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve all FTM chip details with Invalid access token, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListAllFTMChip_WhenNo_FTM_Chips_AddedNeg, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/GetListAllFTMChip/GetListAllFTMChipResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve all FTM chip details when FTM Chips are not added for Partner, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListAllFTMChip_Without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve all FTM chip details without Partner authentication, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ "ftpProviderId": "pms-111888", "make": "AcmeCorpFtm", "model": "mode2" }, output={ }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Create Ftm Chip Details, uniqueIdentifier=TC_PMS_createFtmChipDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_Before_Uploading_Partner_Cert_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_008" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte with valid Partner ID, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacte_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_whichisPendingforCertUpload_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_010" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM which is Pending for Approval, uniqueIdentifier=TC_PMS_DeactivateFtm_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_forPendingforCertUpload_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_008" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte for Pending for Certificate Upload, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificate_AllValid_smoke_ftpProviderId, endPoint=/v1/partnermanager/ftpchipdetail/uploadcertificate, role=partnerftm, templateFields=null, input={ "requesttime":"$TIMESTAMP$", "ftpProviderId": "pms-111888", "ftpChipDeatilId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$", "isItForRegistrationDevice": true, "organizationName": "PMS_API_ABC_ORG", "partnerDomain": "DEVICE" }, output= { }, inputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChip, outputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChipResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Upload FTP chip Certificate, uniqueIdentifier=TC_PMS_UploadCertificateOfFtpChip_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_whichisPendingforApproval_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_010" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM which is Pending for Approval, uniqueIdentifier=TC_PMS_DeactivateFtm_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveFTMChipDetail_allValid_smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partneradmin, templateFields=null, input={ "ftpChipDetailId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$", "approvalStatus": true }, output={ }, inputTemplate=pms/ApproveFTMChipDetail/ApproveFTMChipDetail, outputTemplate=pms/ApproveFTMChipDetail/ApproveFTMChipDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Approve FTM Chip Detail, uniqueIdentifier=TC_PMS_ApproveFTMchipDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListAllFTMChip_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ }, output= { "partnerId": "pms-111888", "make": "AcmeCorpFtm", "model": "mode2 }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/GetListAllFTMChip/GetListAllFTMChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve all FTM chip details with valid details, uniqueIdentifier=TC_PMS_GetListAllFTMChip_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_allValid_smoke, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte with valid Partner ID, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacte_01 |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.utils.AdminTestException: Response has errors
at io.mosip.testrig.apirig.utils.OutputValidationUtil.doJsonOutputValidation(OutputValidationUtil.java:463)
at io.mosip.testrig.apirig.utils.OutputValidationUtil.doJsonOutputValidation(OutputValidationUtil.java:452)
at io.mosip.testrig.apirig.partner.testscripts.GetWithParam.test(GetWithParam.java:115)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_Invalid_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "0191230330" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte while keeping FTM ID parameter as Invalid and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_Invalid_Value_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "fsadf" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte while keeping FTM ID parameter as Invalid and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_SpaceVla_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": " " }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte while keeping FTM ID parameter as Missing and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_with_Invalid_AccessToken_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=invalidtoken, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte with invalid partner access token and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=invalidtoken, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte without partner Authentication and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "status": "approved", "isActive": true }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/DeactivateFtm/DeactivateFtmResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Device with valid Partner authentication, uniqueIdentifier=TC_PMS_DeactivateFtm_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Already_Deactivate_FTM_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_007" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivating the FTM which is already Deactivated and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Empty_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Empty and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Empty_Req_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM keeping ID parameter as Empty in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Empty_Version_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as Empty in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Empty_requestTime_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping requestTime parameter as Empty in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_Values_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "Apple0192938838" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Invalid values and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_VersionValue0_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as invalid value 0 in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_VersionValue1_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as invalid value 1 in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_Version_Num_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "9977", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as invalid values in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_requestTime_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "1111-07-22T08:21:17.665Z", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Request Time parameter as invalid in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Keeping_Req_IDas_Null_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "Null", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping requestID parameter as Null in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Missing_Req_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM with the requestID parameter missing in the request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Missing_Version_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as Missing in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Missing_requestTime_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$REMOVE$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping requestTime parameter as Missing in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Null_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "Null" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Null and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Null_Version_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "Null", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as Null in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_with_SpaceValue_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": " " }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Missing and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=invalidtoken, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM without Partner authentication and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalFtmCertifacte_AfterDeactiveFtm_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_009", "message": "Cannot download the certificate for a deactivated FTM" } ] }, inputTemplate=pms/GetOriginalFtmCertifacteAfterDeactiveFtm/GetOriginalFtmCertifacteAfterDeactiveFtm, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Original Ftm Certifacte After Deactivate Ftm, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteAfterDeactiveFtm_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail, uniqueIdentifier=TC_PMS_FTM_chip_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_make_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?make={make}, role=partneradmin, templateFields=null, input={ "make": "abcd", "pageSize": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for make value contains 'abcd', uniqueIdentifier=TC_PMS_FTM_chip_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_model_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?model={model}, role=partneradmin, templateFields=null, input={ "model": "xyz", "make": "$REMOVE$", "pageSize": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for model value contains 'xyz', uniqueIdentifier=TC_PMS_FTM_chip_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_orgName_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?orgName={orgName}, role=partneradmin, templateFields=null, input={ "orgName": "1", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for orgName which contains '1', uniqueIdentifier=TC_PMS_FTM_chip_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_pagesize_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "pageSize": "5", "status": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for pageSize specified, uniqueIdentifier=TC_PMS_FTM_chip_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_partnerId_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "a", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for partnerId which contains 'a', uniqueIdentifier=TC_PMS_FTM_chip_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_random_value_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "16263gdvddgdv", "model": "$REMOVE$", "make": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail by giving random value for partnerId, uniqueIdentifier=TC_PMS_FTM_chip_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_sortType_ASC, endPoint=/v1/partnermanager/ftpchipdetail/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortType": "ASC", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail by sort type ASC for the given sort field, uniqueIdentifier=TC_PMS_FTM_chip_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_sortType_DESC, endPoint=/v1/partnermanager/ftpchipdetail/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortType": "DESC", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail by sort type DESC for the given sort field, uniqueIdentifier=TC_PMS_FTM_chip_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_approved, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "approved", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as approved, uniqueIdentifier=TC_PMS_FTM_chip_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_deactivated, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "deactivated", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as deactivated, uniqueIdentifier=TC_PMS_FTM_chip_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_pending_approval, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_approval", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as pending_approval, uniqueIdentifier=TC_PMS_FTM_chip_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_pending_cert_upload, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_cert_upload", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as pending_cert_upload, uniqueIdentifier=TC_PMS_FTM_chip_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_rejected, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "rejected", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as rejected, uniqueIdentifier=TC_PMS_FTM_chip_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_with_combination_search_twofields, endPoint=/v1/partnermanager/ftpchipdetail/v2?make={make}&model={model}, role=partneradmin, templateFields=null, input={ "make": "1", "model": "2", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail by giving value for both make and model, uniqueIdentifier=TC_PMS_FTM_chip_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_Negative_pageNo_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "pageNo": "-6", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with negative pageNo, uniqueIdentifier=TC_PMS_FTM_chip_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_Negative_pagesize_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "pageSize": "-6", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with negative pagesize, uniqueIdentifier=TC_PMS_FTM_chip_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_invalid_sortType_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "sortType": "$%$^&&", "sortFieldName": "$REMOVE$", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with invalid sortType, uniqueIdentifier=TC_PMS_FTM_chip_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_invalid_sortfield_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "sortFieldName": "$%$^&&", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with invalid sortfieldname, uniqueIdentifier=TC_PMS_FTM_chip_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_invalid_token_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with invalid token, uniqueIdentifier=TC_PMS_FTM_chip_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail without authentication, uniqueIdentifier=TC_PMS_FTM_chip_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_sortType_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}, role=partnerdevice, templateFields=null, input={ "sortType": "$%$^&&", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with invalid sortType, uniqueIdentifier=TC_PMS_SBI_List_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_sortfield_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}, role=partnerdevice, templateFields=null, input={ "sortFieldName": "$%$^&&", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with invalid sortfield, uniqueIdentifier=TC_PMS_SBI_List_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_token_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with invalid token, uniqueIdentifier=TC_PMS_SBI_List_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_negative_pageNo_Neg, endPoint=/v1/partnermanager/securebiometricinterface?pageNo={pageNo}, role=partnerdevice, templateFields=null, input={ "pageNo": "-7", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with negative pageNo value, uniqueIdentifier=TC_PMS_SBI_List_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_negative_pageSize_Neg, endPoint=/v1/partnermanager/securebiometricinterface?pageSize={pageSize}, role=partnerdevice, templateFields=null, input={ "pageSize": "-7", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "pageNo": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with negative pagesize value, uniqueIdentifier=TC_PMS_SBI_List_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_without_Authentication_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI without Authentication, uniqueIdentifier=TC_PMS_SBI_List_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices, uniqueIdentifier=TC_PMS_devicedetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_deviceId_given, endPoint=/v1/partnermanager/devicedetail?deviceId={deviceId}, role=partneradmin, templateFields=null, input={ "deviceId": "9", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with deviceId given as '9', uniqueIdentifier=TC_PMS_devicedetails_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_deviceId_random_value_given, endPoint=/v1/partnermanager/devicedetail?deviceId={deviceId}, role=partneradmin, templateFields=null, input={ "deviceId": "*****&%", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with random value given for deviceid, uniqueIdentifier=TC_PMS_devicedetails_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_deviceSubType_given, endPoint=/v1/partnermanager/devicedetail?deviceSubType={deviceSubType}, role=partneradmin, templateFields=null, input={ "deviceSubType": "f", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with deviceSubType given as 'i', uniqueIdentifier=TC_PMS_devicedetails_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_deviceType_given, endPoint=/v1/partnermanager/devicedetail?deviceType={deviceType}, role=partneradmin, templateFields=null, input={ "deviceType": "i", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with deviceType given as 'i', uniqueIdentifier=TC_PMS_devicedetails_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_invalid_sortfield_Neg, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$$$$$$", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortType": "DESC", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with invalid sortFieldName, uniqueIdentifier=TC_PMS_devicedetails_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_invalid_sorttype, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}, role=partneradmin, templateFields=null, input={ "sortType": "$$$$$$", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "make", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with invalid sorttype, uniqueIdentifier=TC_PMS_devicedetails_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_invalid_token, endPoint=/v1/partnermanager/devicedetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with invalid token, uniqueIdentifier=TC_PMS_devicedetails_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_make_given, endPoint=/v1/partnermanager/devicedetail?make={make}, role=partneradmin, templateFields=null, input={ "make": "3", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with make given as '3', uniqueIdentifier=TC_PMS_devicedetails_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_model_given, endPoint=/v1/partnermanager/devicedetail?model={model}, role=partneradmin, templateFields=null, input={ "model": "4", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with model given as '4', uniqueIdentifier=TC_PMS_devicedetails_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_multiple_attribute_values_given, endPoint=/v1/partnermanager/devicedetail?make={make}&model={model}, role=partneradmin, templateFields=null, input={ "make": "1", "model": "1", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with make and model is given, uniqueIdentifier=TC_PMS_devicedetails_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_negative_pageno, endPoint=/v1/partnermanager/devicedetail?pageNo={pageNo}, role=partneradmin, templateFields=null, input={ "pageNo": "-5", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with negative pageno, uniqueIdentifier=TC_PMS_devicedetails_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_negative_pagesize, endPoint=/v1/partnermanager/devicedetail?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "pageSize": "-5", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with negative pageSize, uniqueIdentifier=TC_PMS_devicedetails_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_sbiId_given, endPoint=/v1/partnermanager/devicedetail?sbiId={sbiId}, role=partneradmin, templateFields=null, input={ "sbiId": "q", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with sbiId given as 'q', uniqueIdentifier=TC_PMS_devicedetails_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_sbiversion_given, endPoint=/v1/partnermanager/devicedetail?sbiVersion={sbiVersion}, role=partneradmin, templateFields=null, input={ "sbiVersion": "abcd", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with sbiVersion given as 'abcd', uniqueIdentifier=TC_PMS_devicedetails_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_sorttype_asc, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortType": "asc", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with sorttype as 'asc', uniqueIdentifier=TC_PMS_devicedetails_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_sorttype_desc, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}, role=partneradmin, templateFields=null, input={ "sortType": "desc", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "status", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with sorttype as 'desc', uniqueIdentifier=TC_PMS_devicedetails_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_orgName, endPoint=/v1/partnermanager/devicedetail?orgName={orgName}, role=partneradmin, templateFields=null, input={ "orgName": "1", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with orgName value given as '1', uniqueIdentifier=TC_PMS_devicedetails_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_pagesize_specified, endPoint=/v1/partnermanager/devicedetail?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "pageSize": "7", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with pagesize specified, uniqueIdentifier=TC_PMS_devicedetails_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_partnerid, endPoint=/v1/partnermanager/devicedetail?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "a", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with partnerid value given as 'a', uniqueIdentifier=TC_PMS_devicedetails_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_status_approved, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "approved", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with status as approved, uniqueIdentifier=TC_PMS_devicedetails_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_status_deactivated, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "deactivated", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with status as deactivated, uniqueIdentifier=TC_PMS_devicedetails_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_status_pending_approval, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_approval", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with status as pending_approval, uniqueIdentifier=TC_PMS_devicedetails_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_status_rejected, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "rejected", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with status as rejected, uniqueIdentifier=TC_PMS_devicedetails_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_without_Authentication, endPoint=/v1/partnermanager/devicedetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices without authentication, uniqueIdentifier=TC_PMS_devicedetails_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetCountOfFtm_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetCountOfFtm/getCountOfFtm, outputTemplate=pms/GetCountOfFtm/getCountOfFtmResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all active FTM, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllSystemConfigs_All_Valid_Smoke, endPoint=/v1/partnermanager/system-config, role=patneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllSystemConfigs/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllSystemConfigs/getAllApiKeyForAuthPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the configuration for PMS, uniqueIdentifier=TC_PMS_GetAllSystemConfigs_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllSystemConfigs_without_authentication_Neg, endPoint=/v1/partnermanager/system-config, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllSystemConfigs/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the configuration for PMS without authentication, uniqueIdentifier=TC_PMS_GetAllSystemConfigs_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRootCertificate_allValid_smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ }, output={ "caCertificateType": "ROOT" }, inputTemplate=pms/GetAllRootCertificate/getAllRootCertificate, outputTemplate=pms/GetAllRootCertificate/getAllRootCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the root certificates of the Logged in Partner, uniqueIdentifier=null |
| Messages |
| Output Validation Exception |
io.mosip.testrig.apirig.utils.AdminTestException: Failed at output validation
at io.mosip.testrig.apirig.partner.testscripts.GetWithParam.test(GetWithParam.java:121)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Keys, uniqueIdentifier=TC_PMS_GetListOfApiKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_individual_partner_Neg, endPoint=/v1/partnermanager/partner-api-keys?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "pageSize": "$REMOVE$", "partnerId": "pms-111998", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfAllDeviceResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with individual partner, uniqueIdentifier=TC_PMS_GetListOfApiKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_invalid_pageSize, endPoint=/v1/partnermanager/partner-api-keys?pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "pageSize": "-5", "partnerId": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with pageSize, uniqueIdentifier=TC_PMS_GetListOfApiKey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_invalid_sortType_Neg, endPoint=/v1/partnermanager/partner-api-keys?sortType={sortType}, role=partnerauth, templateFields=null, input={ "sortType": "cas", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with invalid sortType, uniqueIdentifier=TC_PMS_GetListOfApiKey_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_negative_pageNo_Neg, endPoint=/v1/partnermanager/partner-api-keys?pageNo={pageNo}, role=partnerauth, templateFields=null, input={ "pageNo": "-1", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with negative pageNo, uniqueIdentifier=TC_PMS_GetListOfApiKey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_negative_pageSize_Neg, endPoint=/v1/partnermanager/partner-api-keys?pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "pageSize": "-5", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with negative pageSize, uniqueIdentifier=TC_PMS_GetListOfApiKey_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_apiKeyLabel_value, endPoint=/v1/partnermanager/partner-api-keys?apiKeyLabel={apiKeyLabel}, role=partnerauth, templateFields=null, input={ "apiKeyLabel": "tyy1", "policyName": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with partial apiKeyLabel values, uniqueIdentifier=TC_PMS_GetListOfApiKey_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_orgName_value, endPoint=/v1/partnermanager/partner-api-keys?orgName={orgName}, role=partnerauth, templateFields=null, input={ "orgName": "sp", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with partial orgName value, uniqueIdentifier=TC_PMS_GetListOfApiKey_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_partnerId_value, endPoint=/v1/partnermanager/partner-api-keys?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "partnerId": "A", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys on passing partial partnerId value, uniqueIdentifier=TC_PMS_GetListOfApiKey_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_policyGroupName_value, endPoint=/v1/partnermanager/partner-api-keys?policyGroupName={policyGroupName}, role=partnerauth, templateFields=null, input={ "policyGroupName": "1", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys on passing partial policyGroupName value, uniqueIdentifier=TC_PMS_GetListOfApiKey_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_policyName_value, endPoint=/v1/partnermanager/partner-api-keys?policyName={policyName}, role=partnerauth, templateFields=null, input={ "policyName": "pqr", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with partial policyName values, uniqueIdentifier=TC_PMS_GetListOfApiKey_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_random_data, endPoint=/v1/partnermanager/partner-api-keys?orgName={orgName}, role=partnerauth, templateFields=null, input={ "orgName": "zz6762j", "apiKeyLabel": "$REMOVE$", "policyName": "$REMOVE$", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with random values given to a valid parameter, uniqueIdentifier=TC_PMS_GetListOfApiKey_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_status_activated, endPoint=/v1/partnermanager/partner-api-keys?status={status}, role=partnerauth, templateFields=null, input={ "status": "activated", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with status activated, uniqueIdentifier=TC_PMS_GetListOfApiKey_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_status_deactivated, endPoint=/v1/partnermanager/partner-api-keys?status={status}, role=partnerauth, templateFields=null, input={ "status": "deactivated", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with status deactivated, uniqueIdentifier=TC_PMS_GetListOfApiKey_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_valid_ascending_sortType, endPoint=/v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=partnerId&pageNo={pageNo}&pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "sortType": "ASC", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "10", "pageNo": "0", "status": "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with ascending sortType, uniqueIdentifier=TC_PMS_GetListOfApiKey_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_valid_descending_sortType, endPoint=/v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=orgName&pageNo={pageNo}&pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "sortType": "DESC", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "10", "pageNo": "0", "status": "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with ascending sortType, uniqueIdentifier=TC_PMS_GetListOfApiKey_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_without_authentication_Neg, endPoint=/v1/partnermanager/partner-api-keys, role=invalidtoken, templateFields=null, input={ }, output= { "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys without authentication, uniqueIdentifier=TC_PMS_GetListOfApiKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DownloadRootCertificate_allValid_smoke, endPoint=/v1/partnermanager/trust-chain-certificates/{certificateId}/certificateFile, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/DownloadRootCertificate/downloadRootCertificate, outputTemplate=pms/DownloadRootCertificate/downloadRootCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Fetching all the root certificates of the Logged in Partner, uniqueIdentifier=null |
| Messages |
| Output Validation Exception |
org.json.JSONException: JSONObject["response"] is not a JSONObject (class org.json.JSONObject$Null : null).
at org.json.JSONObject.wrongValueFormatException(JSONObject.java:2910)
at org.json.JSONObject.getJSONObject(JSONObject.java:782)
at io.mosip.testrig.apirig.partner.testscripts.DownloadRootCertificate.test(DownloadRootCertificate.java:104)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.startTestRunner(MosipTestRunner.java:163)
at io.mosip.testrig.apirig.partner.testrunner.MosipTestRunner.main(MosipTestRunner.java:93)
... Removed 21 stack frames |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_After_Publish_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output= { }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/DeactivatePolicy/DeactivatePolicyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate policy, uniqueIdentifier=TC_PMS_deactivate_policy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_already_deactivated, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_062" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate policy which is already deactiavted, uniqueIdentifier=TC_PMS_deactivate_policy_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_invalid_policyId, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "hhggtt567", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_065" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with invalid policyid, uniqueIdentifier=TC_PMS_deactivate_policy_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_invalid_policyId_spaces, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": " ", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_COR_002" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with only spaces as policyid, uniqueIdentifier=TC_PMS_deactivate_policy_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_invalid_roles, endPoint=/v1/policymanager/policies/{policyId}, role=POLICYMANAGER, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate policy authenticated with invalid roles, uniqueIdentifier=TC_PMS_deactivate_policy_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_with_approved_policyrequests, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_063" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with approved policy requests, uniqueIdentifier=TC_PMS_deactivate_policy_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_without_authentication, endPoint=/v1/policymanager/policies/{policyId}, role=invalidtoken, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate policy without authentication, uniqueIdentifier=TC_PMS_deactivate_policy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_without_id, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "$REMOVE$", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate policy without id, uniqueIdentifier=TC_PMS_deactivate_policy_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_without_requestime, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$REMOVE$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate policy without requesttime, uniqueIdentifier=TC_PMS_deactivate_policy_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_without_version, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate policy without version, uniqueIdentifier=TC_PMS_deactivate_policy_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output= { "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$", "isActive": false }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroupResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group, uniqueIdentifier=TC_PMS_deactivate_policy_group_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_future_date_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "2026-01-24T07:47:57.206Z", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with future date given as requesttime, uniqueIdentifier=TC_PMS_deactivate_policy_group_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_id_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.deactiavte", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with invalid id value, uniqueIdentifier=TC_PMS_deactivate_policy_group_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_policygroupid_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "6776654" }, output={ "errors": [ { "errorCode": "PMS_POL_068" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group invalid policygroupid, uniqueIdentifier=TC_PMS_deactivate_policy_group_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_roles_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=POLICYMANAGER, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group authenticated using invalid roles, uniqueIdentifier=TC_PMS_deactivate_policy_group_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_status_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_073" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with invalid status, uniqueIdentifier=TC_PMS_deactivate_policy_group_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_version_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "2.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group invalid version, uniqueIdentifier=TC_PMS_deactivate_policy_group_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_past_date_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "2024-01-24T07:47:57.206Z", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with past date given as requesttime, uniqueIdentifier=TC_PMS_deactivate_policy_group_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_spacevalue_policygroupid_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": " " }, output={ "errors": [ { "errorCode": "PMS_COR_002" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without policygroupid, uniqueIdentifier=TC_PMS_deactivate_policy_group_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_with_Draftpolicy_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_ForDraftPolicy_pms_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_070" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with draft policy, uniqueIdentifier=TC_PMS_deactivate_policy_group_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_with_deactivated_policies, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_ForDeactivatePolicy_pms_sid_id$" }, output={ "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_ForDeactivatePolicy_pms_sid_id$", "isActive": false }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroupResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with deactivated policies, uniqueIdentifier=TC_PMS_deactivate_policy_group_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_with_publishpolicy_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_056" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with published policy, uniqueIdentifier=TC_PMS_deactivate_policy_group_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_authentication_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=invalidtoken, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without authentication, uniqueIdentifier=TC_PMS_deactivate_policy_group_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_id_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without id value, uniqueIdentifier=TC_PMS_deactivate_policy_group_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_requesttime_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$REMOVE$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without requesttime, uniqueIdentifier=TC_PMS_deactivate_policy_group_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_status_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "$REMOVE$", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_073" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without status, uniqueIdentifier=TC_PMS_deactivate_policy_group_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_version_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without version, uniqueIdentifier=TC_PMS_deactivate_policy_group_06 |
| Messages |